Static task
static1
Behavioral task
behavioral1
Sample
24e48c74c778d14be8b10b54f78c6a778ba643191976590348086bedd8ae5822.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
24e48c74c778d14be8b10b54f78c6a778ba643191976590348086bedd8ae5822.exe
Resource
win10v2004-20220901-en
General
-
Target
24e48c74c778d14be8b10b54f78c6a778ba643191976590348086bedd8ae5822
-
Size
69KB
-
MD5
a3125f11294cc1fdf176fe5c96da6d10
-
SHA1
0ef28cb338a9295ad23520f7e46a60aa866eaf4e
-
SHA256
24e48c74c778d14be8b10b54f78c6a778ba643191976590348086bedd8ae5822
-
SHA512
7da2128eefc825088f869af2fa8c281292eefd03eac86f8700b593b88d65f3c15ec33f0aae346ada8142cf2c7f139c4ae7d6ec36f862722b19df274b6fa0204b
-
SSDEEP
1536:sbJ5Y1W3MJ1bJK8jGjGlPEzXzlnH2EMJFeCmrPxBA:sbJS1W3MJ1b1GiRE5WRKPo
Malware Config
Signatures
Files
-
24e48c74c778d14be8b10b54f78c6a778ba643191976590348086bedd8ae5822.exe windows x86
d9b73e56765baba8085a67bc5c039d8e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempPathA
DuplicateHandle
GetFileType
GetConsoleOutputCP
RemoveDirectoryA
ExpandEnvironmentStringsA
GetCurrentThread
WaitForMultipleObjects
GetDriveTypeA
SetFileAttributesW
CopyFileA
SizeofResource
GetProcAddress
GetModuleHandleW
LCMapStringW
GetVersionExA
GetStringTypeW
GetStringTypeExA
SetStdHandle
CreateProcessW
VirtualQuery
lstrcmpA
DeleteFileA
LoadResource
VirtualProtect
GetModuleHandleA
GetThreadLocale
RtlMoveMemory
GetExitCodeProcess
msvcrt
_XcptFilter
__set_app_type
_initterm
__p__commode
_except_handler3
_adjust_fdiv
__p___initenv
__getmainargs
_controlfp
_exit
__p__fmode
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ