Static task
static1
Behavioral task
behavioral1
Sample
905014482753b20750fa7532631b8af536947d6d1b446cfbc0d0db004f760ab2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
905014482753b20750fa7532631b8af536947d6d1b446cfbc0d0db004f760ab2.exe
Resource
win10v2004-20220812-en
General
-
Target
905014482753b20750fa7532631b8af536947d6d1b446cfbc0d0db004f760ab2
-
Size
287KB
-
MD5
7a67e5be61c391acfde699501d4c2aa4
-
SHA1
83882ccb8d1f6cb33926cf217c25b993784ca29d
-
SHA256
905014482753b20750fa7532631b8af536947d6d1b446cfbc0d0db004f760ab2
-
SHA512
0e7dd306e0a855d3e0897434fd8ddee36b835c55c2898d93c1624531e88f33546bb3993e432d24c7f72ca828833207d583d30d0566c03d8acc387ae2e511d873
-
SSDEEP
6144:z+MfNvjXILGTl8dB5Dsab6zUqgsHSGMFmsSWGCI:qM1T8LDhMUhUSGe6Xd
Malware Config
Signatures
Files
-
905014482753b20750fa7532631b8af536947d6d1b446cfbc0d0db004f760ab2.exe windows x86
1d709cb5ad8569acbaca4cf3f4b6112b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
QueryPerformanceCounter
MultiByteToWideChar
GetCurrentProcessId
LoadLibraryA
GetLocalTime
GetUserDefaultLCID
SetLastError
GetTickCount
GetOEMCP
lstrcpyW
GetProcessHeap
CloseHandle
WideCharToMultiByte
SystemTimeToFileTime
CreateFileA
GetSystemDefaultLangID
GetCurrentProcess
HeapAlloc
SetUnhandledExceptionFilter
lstrcmpA
GetSystemTimeAsFileTime
HeapFree
w32topl
ToplSTHeapDestroy
ToplScheduleCacheDestroy
ToplSTHeapExtractMin
ToplScheduleCreate
ToplScheduleExportReadonly
ToplScheduleDuration
ToplSTHeapInit
ToplScheduleCacheCreate
fmifs
FormatEx
DiskCopy
Extend
Format
Chkdsk
EnableVolumeCompression
Sections
.text Size: 272KB - Virtual size: 304KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 644B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.isdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ