Static task
static1
Behavioral task
behavioral1
Sample
a4cf4413f86b68549bd71917d57f964bbc3473d73c7bea1791bac758c6a68324.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a4cf4413f86b68549bd71917d57f964bbc3473d73c7bea1791bac758c6a68324.exe
Resource
win10v2004-20220812-en
General
-
Target
a4cf4413f86b68549bd71917d57f964bbc3473d73c7bea1791bac758c6a68324
-
Size
26KB
-
MD5
801cbadd02daf89643e717adef1a5551
-
SHA1
97b3d0493e4e07d57b7b6c136d2945364740fa75
-
SHA256
a4cf4413f86b68549bd71917d57f964bbc3473d73c7bea1791bac758c6a68324
-
SHA512
3fd414f69e1befa1e8b9eb49bf9e98d2327c1304ad7df1e34c35270b6402cb0074978630c679d72ed14ff3150b336a25e9a0eb903c88a2eb607cebefe00a4cad
-
SSDEEP
384:AR2vnxRV0EVWYDZWPiv9NIHCMJ0qS9ugdsYILHtBwgVNDCrx5F3NTXajCFAOJvz:M2vxv0O79N2CbN9IN2KNDWFFa6
Malware Config
Signatures
Files
-
a4cf4413f86b68549bd71917d57f964bbc3473d73c7bea1791bac758c6a68324.exe windows x86
c68d73254be3bbf5f5985e74b424f206
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegGetValueW
kernel32
CreateProcessW
SearchPathW
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
UnhandledExceptionFilter
msvcrt
?terminate@@YAXXZ
__set_app_type
_controlfp
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
memset
_except_handler4_common
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 896B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE