Static task
static1
Behavioral task
behavioral1
Sample
56933703f2e0bd1b1ee887838d84c831fa0f55e25f7e1784eab4bb93d30749a9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
56933703f2e0bd1b1ee887838d84c831fa0f55e25f7e1784eab4bb93d30749a9.exe
Resource
win10v2004-20220812-en
General
-
Target
56933703f2e0bd1b1ee887838d84c831fa0f55e25f7e1784eab4bb93d30749a9
-
Size
62KB
-
MD5
a0568315e0b62710ccd3f1d80db2e450
-
SHA1
cecbc48fa134ea85f67b54cc19db97063646217e
-
SHA256
56933703f2e0bd1b1ee887838d84c831fa0f55e25f7e1784eab4bb93d30749a9
-
SHA512
a479dfcf6a339e74ed3ea3e3d4defad0b13b30769cb667f39697e51e7252a6f99968fac08602aefa6cff861c9c51cc751aa3e6ad59c22d3ed1a39226d78b6683
-
SSDEEP
1536:mwScWD2hkyQ35ZctUai8iL6SleGrwu4KGsJsvPOD5kQPfz:FW6qyQJOQ8ivk8w7KGsJsrQ3z
Malware Config
Signatures
Files
-
56933703f2e0bd1b1ee887838d84c831fa0f55e25f7e1784eab4bb93d30749a9.exe windows x86
29113ce35bb8fc37d3f58734e78c0c81
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVDMCurrentDirectories
lstrlenW
GetDevicePowerState
FindFirstFileA
CreateProcessInternalW
SetThreadContext
GetProcessShutdownParameters
GetCommProperties
VirtualQueryEx
ResetEvent
GetNumaAvailableMemory
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 47KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE