Static task
static1
Behavioral task
behavioral1
Sample
d813b0100c8670b21a81db7800181c8a9bda8c3a1085c99742e6858bc770bc3c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d813b0100c8670b21a81db7800181c8a9bda8c3a1085c99742e6858bc770bc3c.exe
Resource
win10v2004-20220812-en
General
-
Target
d813b0100c8670b21a81db7800181c8a9bda8c3a1085c99742e6858bc770bc3c
-
Size
62KB
-
MD5
a92168ff9c9ea08e6cd607d943c64db8
-
SHA1
2b33dde50f91f2c5208be998d0f74bb3fe38067c
-
SHA256
d813b0100c8670b21a81db7800181c8a9bda8c3a1085c99742e6858bc770bc3c
-
SHA512
b7eabaf28b4d509b1b96f55b8fe16f1717a60fc09350b730384ed68385caab65bc9c773e0f658139007ec2084b3e7c25c1ad3c6f6c1dae6d1d7418e504a49875
-
SSDEEP
1536:rElO4AJZXk3brfn74WPyQrCFi+IwuyrTxDMMGDTtQ:5JZXUbrT3rCFi+IwuyrNMdDBQ
Malware Config
Signatures
Files
-
d813b0100c8670b21a81db7800181c8a9bda8c3a1085c99742e6858bc770bc3c.exe windows x86
4792b664ad1a205f136d1e879b5a7c84
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualLock
WriteConsoleInputW
LockFile
GetStringTypeExA
ReadProcessMemory
lstrlenW
Process32Next
UnregisterWait
OpenJobObjectW
ReplaceFileW
CreateProcessInternalA
GetOEMCP
DebugBreak
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 47KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE