Static task
static1
Behavioral task
behavioral1
Sample
305f6d11155d98b37062cd953d79b80a79de298fd50448a482d39fa2dfd4049f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
305f6d11155d98b37062cd953d79b80a79de298fd50448a482d39fa2dfd4049f.exe
Resource
win10v2004-20220812-en
General
-
Target
305f6d11155d98b37062cd953d79b80a79de298fd50448a482d39fa2dfd4049f
-
Size
144KB
-
MD5
a36bc1b6e412a5c23fa6c0ea6d9fe0d0
-
SHA1
b2e755feb68356cd33a240884f03a1b5aec9a1a2
-
SHA256
305f6d11155d98b37062cd953d79b80a79de298fd50448a482d39fa2dfd4049f
-
SHA512
aac39891edae49c03ec304968063e992731c108adec73d233d457f5504ffdff70ca05e618085b880d0502ba58ef89c56ba222bb1b998a44cb3f6f34176fe64ab
-
SSDEEP
3072:AGMohJ718OEiNBP718rBrBQyizKgtFJlsmiY:LhJ58OdV7CFiyiWC6miY
Malware Config
Signatures
Files
-
305f6d11155d98b37062cd953d79b80a79de298fd50448a482d39fa2dfd4049f.exe windows x86
adf801abd4677429ccec4447083cae59
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesExA
GetLastError
GetModuleHandleA
GetProcAddress
CloseHandle
GetTempPathA
GetTickCount
RtlUnwind
SetLastError
GetCommandLineA
GetStdHandle
MultiByteToWideChar
GetFileType
LoadLibraryA
FreeLibrary
LocalFree
FindFirstFileA
LocalAlloc
WriteConsoleA
FormatMessageA
FindNextFileA
GetFileAttributesA
VerifyVersionInfoW
crtdll
__GetMainArgs
exit
raise
signal
ntdll
VerSetConditionMask
wcsncpy
wcschr
wcslen
memmove
_wcslwr
wcscmp
wcscpy
_wcsnicmp
wcscat
_ultoa
wcstoul
wcstol
user32
LoadStringA
winsta
WinStationOpenServerW
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 129KB - Virtual size: 364KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idat Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 434B - Virtual size: 434B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ