Static task
static1
Behavioral task
behavioral1
Sample
d4acac591538137ac06b9273eff82450ee0e61be1d5df8f77685d7e9ccfd91e9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d4acac591538137ac06b9273eff82450ee0e61be1d5df8f77685d7e9ccfd91e9.exe
Resource
win10v2004-20220901-en
General
-
Target
d4acac591538137ac06b9273eff82450ee0e61be1d5df8f77685d7e9ccfd91e9
-
Size
77KB
-
MD5
7e80441e213b3662c1d9c38612fa4ad9
-
SHA1
8de3d340ee19fe1c9cf2758e25d8d117c3d66e07
-
SHA256
d4acac591538137ac06b9273eff82450ee0e61be1d5df8f77685d7e9ccfd91e9
-
SHA512
870f2c24dbe376df64716f71a26268b46380059d686f2f8e4590510798f7d24318d6cbc9126ab755223af66737346452825ac573736b413934c027bce5dd3dcd
-
SSDEEP
1536:eZSxK+4iYsIJEuAXfk8XVQPoU7ILmioUwXMHnV/ZtC9NXotit9wA6:eZSaiquTqdEPDcPw5
Malware Config
Signatures
Files
-
d4acac591538137ac06b9273eff82450ee0e61be1d5df8f77685d7e9ccfd91e9.exe windows x86
9a0c7de8fd593c7e1c55efbf8678cac7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetTempPathA
GlobalHandle
GetCurrentThread
InterlockedDecrement
VirtualFree
GetFileAttributesW
FormatMessageA
GetEnvironmentVariableA
IsDebuggerPresent
CreateProcessA
DeviceIoControl
IsBadWritePtr
LoadResource
SizeofResource
GetThreadLocale
FileTimeToSystemTime
GetExitCodeProcess
GetProcAddress
CompareStringA
VirtualProtect
DeleteFileA
GlobalFree
RtlMoveMemory
GetCurrentProcess
GetModuleHandleW
GetUserDefaultLCID
msvcrt
_XcptFilter
_adjust_fdiv
_exit
_controlfp
__p___initenv
__getmainargs
__set_app_type
_except_handler3
__p__commode
_initterm
__p__fmode
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ