Static task
static1
Behavioral task
behavioral1
Sample
54ae02fdc5de8e970b1400ff68de9d2ca6bd6f09993558625637d6724a4c1348.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
54ae02fdc5de8e970b1400ff68de9d2ca6bd6f09993558625637d6724a4c1348.exe
Resource
win10v2004-20220812-en
General
-
Target
54ae02fdc5de8e970b1400ff68de9d2ca6bd6f09993558625637d6724a4c1348
-
Size
825KB
-
MD5
93f3dbd37dbee5a7c69fa19a2c617590
-
SHA1
cbc92984fafc849996b9de78e41ded1b09504a75
-
SHA256
54ae02fdc5de8e970b1400ff68de9d2ca6bd6f09993558625637d6724a4c1348
-
SHA512
dedd4dd0a76fd47aa86183d04bfea60615292bc16340a383db4e2fe82260bfaafced47727003737aded4c775b1c87b41feb1ddbfdb91df5e66b1541a79965e11
-
SSDEEP
24576:KN44zHG+geuikSA0r6eiTm8hXd2HjFcaMnb:KN44byeuikcu/2HjFc7b
Malware Config
Signatures
Files
-
54ae02fdc5de8e970b1400ff68de9d2ca6bd6f09993558625637d6724a4c1348.exe windows x86
69a23be7efbdfe9361091082b5f13373
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
VirtualQuery
GetDriveTypeA
GetDriveTypeA
GetFileAttributesA
GetDriveTypeA
LoadLibraryA
GetDriveTypeA
GetDriveTypeA
DeleteFileA
GetModuleFileNameA
GetDriveTypeA
GetLongPathNameW
IsBadStringPtrA
GetDriveTypeA
GetDriveTypeA
GetDriveTypeA
msxml6
DllSetProperty
DllRegisterServer
DllGetClassObject
DllCanUnloadNow
Sections
.txt Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.odata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cdata Size: 805KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ