Static task
static1
Behavioral task
behavioral1
Sample
4283e7a75225a81a845aa138639b1fa5084f79d2e48835a1d42bbc001917c73e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4283e7a75225a81a845aa138639b1fa5084f79d2e48835a1d42bbc001917c73e.exe
Resource
win10v2004-20220901-en
General
-
Target
4283e7a75225a81a845aa138639b1fa5084f79d2e48835a1d42bbc001917c73e
-
Size
282KB
-
MD5
a3bb10facad7933c29ba398d5ca7b220
-
SHA1
4039f6f4e9c36311644a0fbd3875e12f214a425e
-
SHA256
4283e7a75225a81a845aa138639b1fa5084f79d2e48835a1d42bbc001917c73e
-
SHA512
eee6c567e1222bf53c0e7fea80a4b3b4a9a401c7efadec7415031b2f91a6b8443af71d8da05e65d8248fba2c542a911b45e519d221c90a159e8df6663ba6c12e
-
SSDEEP
6144:CU8/ILk1M3cOaRi1QZ9j8rMgPJGl2mQytjogJzrqaYajv4wKK:LiS2i1QHj8MgPglBzPnqkQw1
Malware Config
Signatures
Files
-
4283e7a75225a81a845aa138639b1fa5084f79d2e48835a1d42bbc001917c73e.exe windows x86
3bba5f9f3ed0289d2082ea58aa80f063
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
SetStdHandle
CloseHandle
GetStringTypeW
LCMapStringW
LCMapStringA
HeapFree
HeapAlloc
LeaveCriticalSection
InitializeCriticalSection
WriteFile
VirtualFree
HeapCreate
HeapDestroy
WideCharToMultiByte
GetEnvironmentStrings
MultiByteToWideChar
GetOEMCP
GetACP
GetCPInfo
GetModuleFileNameA
DeleteCriticalSection
GetStartupInfoA
SetHandleCount
TlsGetValue
SetLastError
TlsAlloc
TlsSetValue
ExitProcess
GetVersion
GetCommandLineA
GlobalFree
GlobalAlloc
LocalFree
FreeEnvironmentStringsA
OutputDebugStringW
SuspendThread
lstrcmpA
GetTempPathA
IsValidLocale
OpenSemaphoreW
user32
GetClientRect
GetParent
msvcrt
_chdir
Sections
.text Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 330KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ