Static task
static1
Behavioral task
behavioral1
Sample
429de5bc513045ad507384416344c39b3697f731d59d471122e17ed59e0815dc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
429de5bc513045ad507384416344c39b3697f731d59d471122e17ed59e0815dc.exe
Resource
win10v2004-20220901-en
General
-
Target
429de5bc513045ad507384416344c39b3697f731d59d471122e17ed59e0815dc
-
Size
144KB
-
MD5
a3bf0abb068ead1e05f196ee60a060b0
-
SHA1
187f5fb9460069729964b3923fdd31e892d5f9c5
-
SHA256
429de5bc513045ad507384416344c39b3697f731d59d471122e17ed59e0815dc
-
SHA512
c36bb7d9df29a09839e7d8224f10ec8fdd8e365d2b27a91f198f943299721218a46f91d43ef3c73923dbad00155458fa7bba3cfd261e1d07e8f38467808c958c
-
SSDEEP
3072:AGMohJ718OEiNBP718rBrBQyizKgtFJlsmiK:LhJ58OdV7CFiyiWC6miK
Malware Config
Signatures
Files
-
429de5bc513045ad507384416344c39b3697f731d59d471122e17ed59e0815dc.exe windows x86
adf801abd4677429ccec4447083cae59
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesExA
GetLastError
GetModuleHandleA
GetProcAddress
CloseHandle
GetTempPathA
GetTickCount
RtlUnwind
SetLastError
GetCommandLineA
GetStdHandle
MultiByteToWideChar
GetFileType
LoadLibraryA
FreeLibrary
LocalFree
FindFirstFileA
LocalAlloc
WriteConsoleA
FormatMessageA
FindNextFileA
GetFileAttributesA
VerifyVersionInfoW
crtdll
__GetMainArgs
exit
raise
signal
ntdll
VerSetConditionMask
wcsncpy
wcschr
wcslen
memmove
_wcslwr
wcscmp
wcscpy
_wcsnicmp
wcscat
_ultoa
wcstoul
wcstol
user32
LoadStringA
winsta
WinStationOpenServerW
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 129KB - Virtual size: 364KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idat Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 434B - Virtual size: 434B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ