Static task
static1
Behavioral task
behavioral1
Sample
94ee2625c7a1ecdacb3667a84b974c1e92c8edb713bc6d6df193bb01ba841278.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
94ee2625c7a1ecdacb3667a84b974c1e92c8edb713bc6d6df193bb01ba841278.exe
Resource
win10v2004-20220812-en
General
-
Target
94ee2625c7a1ecdacb3667a84b974c1e92c8edb713bc6d6df193bb01ba841278
-
Size
588KB
-
MD5
52b44a14533575026f46a389b7f374e0
-
SHA1
dc0d4f7537158c4acb766594ad78114d50be94b5
-
SHA256
94ee2625c7a1ecdacb3667a84b974c1e92c8edb713bc6d6df193bb01ba841278
-
SHA512
9b074c39129acee91e4771c4ebdfe84172656df47c53bd47347f7c594da7ddaefb57843cd763565dd12006f6d38fc89641a04a0dc113a044e37a54cdd5906249
-
SSDEEP
12288:S528UPsQhJTJtLkv13m4BrdytiK8N0E/urs/aOSOY3Hjy:S/UnJttLsKm0EGoShY
Malware Config
Signatures
Files
-
94ee2625c7a1ecdacb3667a84b974c1e92c8edb713bc6d6df193bb01ba841278.exe windows x86
eb8f8dc567572f6c0cf25f671d18c41a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCreate
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
GetModuleHandleA
VirtualFree
HeapFree
RtlUnwind
WriteFile
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
VirtualAlloc
HeapReAlloc
GetProcAddress
LoadLibraryA
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sections
.text Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 552KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE