Static task
static1
Behavioral task
behavioral1
Sample
561be02a22ca09cb9d610da804fbc9a55caed733665e2acfb9ce39575daa3920.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
561be02a22ca09cb9d610da804fbc9a55caed733665e2acfb9ce39575daa3920.exe
Resource
win10v2004-20220812-en
General
-
Target
561be02a22ca09cb9d610da804fbc9a55caed733665e2acfb9ce39575daa3920
-
Size
119KB
-
MD5
932b872efcb9aeeeef74451bfe70f271
-
SHA1
cb6f2060e90de4825c951a641595c0877a2ee55a
-
SHA256
561be02a22ca09cb9d610da804fbc9a55caed733665e2acfb9ce39575daa3920
-
SHA512
f3209fe44008ced646da10a717d7470d194562d18aede33a3fe6d647a2c523417d1e564b084bef4aafb2ff494a411ba36ea8f60006edbf060dacb5d54c46fab0
-
SSDEEP
1536:Ae0VKeGodGUWiNrOx1FS1RbMMgIus0p04J/K0agpcfyGM5BbbQnijdAmcZk:Ae43LWi5OEmUU0GN4Wngivkk
Malware Config
Signatures
Files
-
561be02a22ca09cb9d610da804fbc9a55caed733665e2acfb9ce39575daa3920.exe windows x86
7a57f33e41f80b253115d2ee093aa753
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetThreadLocale
WaitForSingleObject
GetTempPathA
SetThreadLocale
CreateProcessW
LocalFileTimeToFileTime
IsBadReadPtr
WideCharToMultiByte
GetEnvironmentStringsW
GetModuleHandleW
GetStringTypeA
VirtualProtect
GlobalAlloc
CreateDirectoryA
GetSystemTimeAsFileTime
IsBadCodePtr
CompareFileTime
GetProcAddress
lstrlenA
GetStdHandle
GetCurrentDirectoryA
msvcrt
_initterm
_except_handler3
_XcptFilter
_controlfp
__set_app_type
__p___initenv
__getmainargs
atan2
calloc
_exit
free
__p__commode
_adjust_fdiv
__p__fmode
Sections
.text Size: 1024B - Virtual size: 562B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 1018B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 98KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ