Static task
static1
Behavioral task
behavioral1
Sample
4f1d16436955c6a5e18468c90657b76bd01807a45865e51e1ce135a875dbb427.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4f1d16436955c6a5e18468c90657b76bd01807a45865e51e1ce135a875dbb427.exe
Resource
win10v2004-20220812-en
General
-
Target
4f1d16436955c6a5e18468c90657b76bd01807a45865e51e1ce135a875dbb427
-
Size
109KB
-
MD5
83cdd88953ef562fd028c0aca01f395f
-
SHA1
a2ccc6f4de7452f88ef5c6b4cc8d69dd7fef14f7
-
SHA256
4f1d16436955c6a5e18468c90657b76bd01807a45865e51e1ce135a875dbb427
-
SHA512
80bbbd05dc9275807252c14c746b18713fc03461ee3a9be8baeb0cccdf06f2678c35274e3e1b57c387f8f5b7b2c76f653dfba4b999ca9b17ef617314e06e118a
-
SSDEEP
3072:g7urgsNeond65cyZYzH7Iv4Q60Tg6G67X:LN1d65cyZYDUp6Wg6G67X
Malware Config
Signatures
Files
-
4f1d16436955c6a5e18468c90657b76bd01807a45865e51e1ce135a875dbb427.exe windows x86
d4ebce22a611ad26d786c2edd96ab589
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVolumePathNamesForVolumeNameA
SetLocaleInfoW
SetThreadLocale
GetProcessShutdownParameters
GetThreadPriority
SetConsoleMode
GetDefaultCommConfigA
CreateWaitableTimerA
SetHandleInformation
AddAtomW
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 85KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE