Static task
static1
Behavioral task
behavioral1
Sample
1a7312a0c285a1f63a3d85209fe773abd0a76cb1934c363fb1f77aff263a7016.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1a7312a0c285a1f63a3d85209fe773abd0a76cb1934c363fb1f77aff263a7016.exe
Resource
win10v2004-20220812-en
General
-
Target
1a7312a0c285a1f63a3d85209fe773abd0a76cb1934c363fb1f77aff263a7016
-
Size
35KB
-
MD5
9385f0d185a6f5e26bc35d9f871e0b88
-
SHA1
cec94416bf9661304a3316a46d62c0e27206f997
-
SHA256
1a7312a0c285a1f63a3d85209fe773abd0a76cb1934c363fb1f77aff263a7016
-
SHA512
9bf446c3537c5897dd7cfb5bc9e5ccb894d7840701bcdf9854e0f08fa70afa244b4e6fea6fb6c85c7da8b427beb14a01f67525128b256856fa7bf55096f5d1dd
-
SSDEEP
768:hXRofjv9It5kMOaQ5hngZ8zR51f3iOSaegEvLC9bU:lRoIOaMW+zR5NiOSawvkU
Malware Config
Signatures
Files
-
1a7312a0c285a1f63a3d85209fe773abd0a76cb1934c363fb1f77aff263a7016.exe windows x86
18fad658178ac3d10eb628f982fdd4ca
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc80u
ord6272
ord4008
ord4032
ord860
ord3824
ord1049
ord5971
ord293
ord577
ord5558
ord3327
ord5484
ord897
ord4255
ord899
ord4475
ord3943
ord2638
ord3703
ord3713
ord3712
ord2527
ord2640
ord2534
ord2832
ord2708
ord4301
ord776
ord2829
ord2725
ord2531
ord5562
ord5209
ord5226
ord4562
ord3942
ord2239
ord5222
ord5220
ord1079
ord3795
ord1198
ord6274
ord4320
ord2054
ord757
ord2009
ord566
ord5579
ord3800
ord1007
ord5096
ord6215
ord3677
ord5378
ord4535
ord3826
ord1911
ord2925
ord764
msvcr80
_decode_pointer
?terminate@@YAXXZ
_except_handler4_common
_invoke_watson
_controlfp_s
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__CxxFrameHandler3
_snwprintf_s
_amsg_exit
__wgetmainargs
memset
kernel32
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoW
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
CloseHandle
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetCurrentThreadId
CreateProcessW
shell32
SHGetSpecialFolderPathW
comctl32
InitCommonControlsEx
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CHONG Size: 512B - Virtual size: 155B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE