Static task
static1
Behavioral task
behavioral1
Sample
53d2b7d4ff62398e9789dc4d1f772facb7ff71de0668c13b6511d4a9707682ea.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
53d2b7d4ff62398e9789dc4d1f772facb7ff71de0668c13b6511d4a9707682ea.exe
Resource
win10v2004-20220812-en
General
-
Target
53d2b7d4ff62398e9789dc4d1f772facb7ff71de0668c13b6511d4a9707682ea
-
Size
275KB
-
MD5
814f0ff55f56f9044d744019dfeaf126
-
SHA1
63e5cea8bf25f39673cccf849c95edbccf7331e3
-
SHA256
53d2b7d4ff62398e9789dc4d1f772facb7ff71de0668c13b6511d4a9707682ea
-
SHA512
9d2f6351aaa9061a99d10185af717124db1b773ca4e372ebdb2eb201f88d58608387c322da835419de8ca0aa9a4877ecb16f63ba07b0e9c6458fa6392e31fa02
-
SSDEEP
6144:X0226zAAavllG4pk/+rAlXtCGVg0ex6gOuVSgSHZ:E22kavXtpXrAlUGu/6gOD5
Malware Config
Signatures
Files
-
53d2b7d4ff62398e9789dc4d1f772facb7ff71de0668c13b6511d4a9707682ea.exe windows x86
0e0e88f717889749437d844e3027043e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenW
HeapFree
GetLocaleInfoW
GetUserDefaultLCID
LoadLibraryA
GetProcessHeap
GetCurrentProcessId
GetTickCount
lstrcpyW
WideCharToMultiByte
MultiByteToWideChar
HeapAlloc
GetCurrentProcess
GetOEMCP
GetLocalTime
SetLastError
CreateFileA
SetUnhandledExceptionFilter
GetSystemTimeAsFileTime
lstrcmpA
GlobalFindAtomA
SystemTimeToFileTime
CloseHandle
QueryPerformanceCounter
FindResourceW
fmifs
EnableVolumeCompression
Chkdsk
DiskCopy
FormatEx
ComputeFmMediaType
Format
Extend
w32topl
ToplScheduleExportReadonly
ToplSTHeapDestroy
ToplSTHeapExtractMin
ToplSTHeapInit
ToplScheduleCreate
ToplScheduleCacheCreate
ToplScheduleCacheDestroy
ToplScheduleDuration
Sections
.text Size: 270KB - Virtual size: 301KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 644B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ