Static task
static1
Behavioral task
behavioral1
Sample
131550e19f4b5882629c6c5f1e582f97670eb282705686c6f25ed0d46b181b3c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
131550e19f4b5882629c6c5f1e582f97670eb282705686c6f25ed0d46b181b3c.exe
Resource
win10v2004-20220901-en
General
-
Target
131550e19f4b5882629c6c5f1e582f97670eb282705686c6f25ed0d46b181b3c
-
Size
27KB
-
MD5
a34d3909ce3f91aa3ace63bbf29e6340
-
SHA1
3a6b892c53c881a77e67500ff4fe7f8630ef6ea3
-
SHA256
131550e19f4b5882629c6c5f1e582f97670eb282705686c6f25ed0d46b181b3c
-
SHA512
f623140f152edfd2b988059a5bdd0c04cae0fb3bb1205e8026fa6414cc13b9e3361708eddda448785b032a168c0eeaab610d09d4bf54bc7f127aa2a80425a831
-
SSDEEP
384:M5fi1kQz5hHLMWxqeOdOsyC4RCT4NWh/hZGqh:Mg1kQz5hVxD8yCfThh/hUA
Malware Config
Signatures
Files
-
131550e19f4b5882629c6c5f1e582f97670eb282705686c6f25ed0d46b181b3c.exe windows x86
4415e9effa442916d508f022ed05319c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteA
ShellExecuteExA
SHChangeNotify
kernel32
CopyFileA
CreateFileA
GetTempPathA
GetTempFileNameA
SetProcessPriorityBoost
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
lstrcatA
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
ExitProcess
DeleteFileA
SetFileAttributesA
Sleep
CloseHandle
WriteFile
lstrlenA
user32
GetMessageA
SetTimer
wsprintfA
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 431B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 806B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ