Static task
static1
Behavioral task
behavioral1
Sample
321e264b332efbb0e9469c5e15c5090215a3ed8585e321d7f6934ce6070ebe10.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
321e264b332efbb0e9469c5e15c5090215a3ed8585e321d7f6934ce6070ebe10.exe
Resource
win10v2004-20220812-en
General
-
Target
321e264b332efbb0e9469c5e15c5090215a3ed8585e321d7f6934ce6070ebe10
-
Size
86KB
-
MD5
7ba7c548bff6b95cf5a69b28e0d4a6f0
-
SHA1
7fb065e3616bbaf5c91a1069da2e033ad28bcc19
-
SHA256
321e264b332efbb0e9469c5e15c5090215a3ed8585e321d7f6934ce6070ebe10
-
SHA512
20cbc00128f8619ce5071fa2b526155c72df0d4e582388740f0a989ee6cfb36b46328c02f7f5a032e17708e88c161140bb14da3cc7feb5f92e30a6810531d239
-
SSDEEP
1536:G8mysTaGsmGvvy88Kmg4rF9XYyxE+krDSQUjEAKk0+/3E4axF:pAsmGvKtKmlrsyxzUDZUQjF
Malware Config
Signatures
Files
-
321e264b332efbb0e9469c5e15c5090215a3ed8585e321d7f6934ce6070ebe10.exe windows x86
1d12846ef2b6c51297c90c4a33ede631
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_strnicmp
_wfullpath
_strlwr
wcstoul
_XcptFilter
wcschr
__setusermatherr
_timezone
bsearch
div
abort
gdi32
SetLayout
SetPixel
ExtTextOutA
SetPixelFormat
SetROP2
EndDoc
advapi32
InitializeAcl
AllocateAndInitializeSid
RegQueryValueExA
RegEnumKeyExA
version
GetFileVersionInfoA
GetFileVersionInfoW
kernel32
ExitProcess
CreateEventA
GetCurrentProcessId
GetStringTypeA
GetStartupInfoW
GetLastError
GetShortPathNameA
WriteConsoleW
VirtualAlloc
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 31KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 14KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ