Static task
static1
Behavioral task
behavioral1
Sample
857dfe87eb896ceecb5051934224582632c4c0ee9e2aecac0546eb3db1e281fe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
857dfe87eb896ceecb5051934224582632c4c0ee9e2aecac0546eb3db1e281fe.exe
Resource
win10v2004-20220812-en
General
-
Target
857dfe87eb896ceecb5051934224582632c4c0ee9e2aecac0546eb3db1e281fe
-
Size
180KB
-
MD5
cb1ddbf44541b7fccb7e71e94925664f
-
SHA1
50600f737b2c79f9cdc659292f4ca0a447dbe932
-
SHA256
857dfe87eb896ceecb5051934224582632c4c0ee9e2aecac0546eb3db1e281fe
-
SHA512
e3c468ca74e1fb7c56bbf2312fe4eedacc1250e410153dc2dd19d047a5dd003776372bdea5a41b30df1bdee2adff5f9a3b9dda20b2c26596bfcce5bf52e0f3dc
-
SSDEEP
3072:8qUCn8pM/GwFbCCHdz1JUMS7aJxdHgB1lb2WEFY1cxmyqWbhvBFFIq:PhDP+CHdDa8xdHgDlb3Dw1Z
Malware Config
Signatures
Files
-
857dfe87eb896ceecb5051934224582632c4c0ee9e2aecac0546eb3db1e281fe.exe windows x86
e8b8f23e6dccda6a47bc843a2e3c2554
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapReAlloc
SetStdHandle
GlobalGetAtomNameW
LoadLibraryA
HeapSize
GetDateFormatA
GetTimeFormatA
GetSystemTimeAsFileTime
SetFilePointer
TerminateProcess
GetLocaleInfoA
EnterCriticalSection
InitializeCriticalSection
UnhandledExceptionFilter
WriteConsoleA
IsValidCodePage
EnumResourceNamesA
FreeLibrary
LeaveCriticalSection
VirtualAlloc
GetACP
GetOEMCP
MultiByteToWideChar
GetCPInfo
WriteFile
GetCPInfoExW
SetUnhandledExceptionFilter
GetCurrentProcess
GetConsoleOutputCP
RtlUnwind
IsDebuggerPresent
GetCurrentProcessId
RaiseException
rpcrt4
RpcStringFreeA
shlwapi
SHCreateStreamOnFileA
SHCreateStreamOnFileEx
PathIsContentTypeA
PathAppendA
PathIsFileSpecA
PathCreateFromUrlW
Sections
.text Size: 89KB - Virtual size: 232KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ