BXCOKSF
OOVAOWU
XWHMSNC
Static task
static1
Behavioral task
behavioral1
Sample
e7f0a3a3553dc4eb25e9337f664d93c8fd951a328952883f10f09621a2255968.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e7f0a3a3553dc4eb25e9337f664d93c8fd951a328952883f10f09621a2255968.exe
Resource
win10v2004-20220901-en
Target
e7f0a3a3553dc4eb25e9337f664d93c8fd951a328952883f10f09621a2255968
Size
1.3MB
MD5
ef47687cddafd1fb06d3705b3409a52e
SHA1
5c3c7ed3705205c38cf2a12a1ccc9a4e394da1ee
SHA256
e7f0a3a3553dc4eb25e9337f664d93c8fd951a328952883f10f09621a2255968
SHA512
b178465e17738f9489fc75bd5d5866de361bd88182bf214066884fa3e9d7a83ec40b7d4b9ba063d6668c0ae86e22d4385ad51994116c414651434a4225eb5100
SSDEEP
24576:u7Djpcup0fXIXSxJxqW6ZvNrryeq7Xr8N9bb3DFsH:uzmupI9xJEWstyewkb7ZsH
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseHandle
GetTickCount
HeapFree
MoveFileExA
WriteFile
DeleteFileA
Sleep
ReadFile
HeapAlloc
GetProcessHeap
CreateProcessA
CreateFileA
lstrlenA
ExitProcess
lstrcatA
lstrcpyA
CopyFileA
GetTempPathA
GetModuleFileNameA
GetCommandLineA
GetFileSize
wsprintfA
StrStrIA
StrRChrA
BXCOKSF
OOVAOWU
XWHMSNC
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ