Static task
static1
Behavioral task
behavioral1
Sample
7dd02046db4f839c03a83518feab932927e54434a35a87f65763398f2970696b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7dd02046db4f839c03a83518feab932927e54434a35a87f65763398f2970696b.exe
Resource
win10v2004-20220812-en
General
-
Target
7dd02046db4f839c03a83518feab932927e54434a35a87f65763398f2970696b
-
Size
141KB
-
MD5
5c20cd239e07e8da0683acbc9560b4f0
-
SHA1
3c8f1f8a3261550f822f5332292aac000e00aaf4
-
SHA256
7dd02046db4f839c03a83518feab932927e54434a35a87f65763398f2970696b
-
SHA512
407dc72a27740fcdeafeb4d404161aa5a930b28fb729e4b2aea12409e53f7f5a9bbb466155874818593ecdca9c2e638c6398e7f386069cb27d5136ed0251a570
-
SSDEEP
3072:yRPT4bfjgIr1Noif+PzhtDUdORYHYXmtCgK5RdsNp13EYv4hGSctwfbhysi8EtR1:hjlCgERdsN/3r5Sct2bhXi8EfUAX
Malware Config
Signatures
Files
-
7dd02046db4f839c03a83518feab932927e54434a35a87f65763398f2970696b.exe windows x86
b80a7b1da298364d55670c441dd9a038
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesExA
HeapDestroy
HeapFree
HeapCreate
HeapAlloc
GetProcessHeap
CloseHandle
ReadFile
SetFilePointer
CreateFileA
QueryPerformanceCounter
ExitProcess
GetModuleFileNameA
Sleep
GetProcAddress
LoadLibraryA
VirtualAlloc
VirtualFree
IsBadReadPtr
lstrcmpiA
FreeLibrary
GetStartupInfoA
GetModuleHandleA
HeapReAlloc
GetCommandLineA
user32
wvsprintfA
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 722B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE