Static task
static1
Behavioral task
behavioral1
Sample
032e99bb04c5381379975a74c59bfc8da13e6c47fcb9555dd7c8fe70793de08c.exe
Resource
win7-20220812-en
General
-
Target
032e99bb04c5381379975a74c59bfc8da13e6c47fcb9555dd7c8fe70793de08c
-
Size
132KB
-
MD5
88505258fec261f776c5e4ec27128d59
-
SHA1
2f708cb582236d54f09bab458ff8e37f52b00a20
-
SHA256
032e99bb04c5381379975a74c59bfc8da13e6c47fcb9555dd7c8fe70793de08c
-
SHA512
e5344fc3a030894cb5d3eddafb5c74436b17814b88b50fbb69780a6aa8ec140486921ee37acf4b909ebe6147141fd2f0e8af0f8156000169eb7b58970263a466
-
SSDEEP
3072:LpU9ySzTTCCfDHi4QrJbZ82YzGmoSX4BWvUk:8yoTCCfeeXFLgWvV
Malware Config
Signatures
Files
-
032e99bb04c5381379975a74c59bfc8da13e6c47fcb9555dd7c8fe70793de08c.exe windows x86
164cfcac541a7ac8708f5df850d78093
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
CreateFileA
lstrcmpA
lstrlenA
lstrcpynA
GetTickCount
WriteFile
GetCommandLineA
lstrcatA
GetLastError
GetProcAddress
VirtualAlloc
GetTempFileNameA
GetLocalTime
LoadLibraryA
OpenMutexA
FindAtomA
GetModuleFileNameA
GetModuleHandleA
CreateMutexA
CloseHandle
GetVersion
GetTempPathA
GetSystemTime
lstrcpyA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
VirtualQuery
RtlUnwind
IsDebuggerPresent
user32
GetWindowRect
ClientToScreen
wsprintfA
InflateRect
GetCursorPos
GetCaretPos
EqualRect
IsWindowVisible
GetFocus
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.irdata Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE