Static task
static1
Behavioral task
behavioral1
Sample
387d2c64e6fa9ba6983132d51903d1c3891387afb17ab0ed900b8d481aae6842.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
387d2c64e6fa9ba6983132d51903d1c3891387afb17ab0ed900b8d481aae6842.exe
Resource
win10v2004-20220812-en
General
-
Target
387d2c64e6fa9ba6983132d51903d1c3891387afb17ab0ed900b8d481aae6842
-
Size
75KB
-
MD5
8dee26fd3970229d1e192bb340a2b00b
-
SHA1
508e81cc884b994e913526cd0ac84606d7e2f42f
-
SHA256
387d2c64e6fa9ba6983132d51903d1c3891387afb17ab0ed900b8d481aae6842
-
SHA512
cbb2a3835dfd579d6c2d161c25aaf621b6edf7fb36c5163751aa9d82e06285b7224a44bebd4f858e058f5a83b18a0a7aba8d85af16055bb4959dc5279cfdd78e
-
SSDEEP
1536:vAjGvUeITb1+B1k8XCiM8zjNFq345QvTVdFWot9:vAjtTsBpXCfIbq3MQvTVdB9
Malware Config
Signatures
Files
-
387d2c64e6fa9ba6983132d51903d1c3891387afb17ab0ed900b8d481aae6842.exe windows x86
b60bee5e22211545523e3b711f027373
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Toolhelp32ReadProcessMemory
SetConsoleLocalEUDC
HeapFree
GetNumaNodeProcessorMask
GetFirmwareEnvironmentVariableA
lstrcpy
ExitThread
FindFirstFileExW
DeleteTimerQueueTimer
PeekNamedPipe
WriteFileGather
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 61KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE