Static task
static1
Behavioral task
behavioral1
Sample
1a5e8bf77403ae43bd773563f7e533264714d5b2efaaae8d70b541c066ed8eff.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1a5e8bf77403ae43bd773563f7e533264714d5b2efaaae8d70b541c066ed8eff.exe
Resource
win10v2004-20220901-en
General
-
Target
1a5e8bf77403ae43bd773563f7e533264714d5b2efaaae8d70b541c066ed8eff
-
Size
180KB
-
MD5
82fe20edeeaff26da0eb0eff9e778295
-
SHA1
40d31ac88a3f9872ba7e7c189889b5a8496d29da
-
SHA256
1a5e8bf77403ae43bd773563f7e533264714d5b2efaaae8d70b541c066ed8eff
-
SHA512
70e8612cf09e3dc27c6c7402a2afd442432431a5e5e90f436562c6aff0f18eced590acf6a9a07a7d27f13d679527dd86a68c492913aef4c25fc07b5b929cf9e2
-
SSDEEP
3072:eRh8pxG9tbI2wG6XIsdhao6toJKnTNAavxHq5/guKLoF8C/SWdABaSvAqUn0:i8KQq64sdgpwMbo5/RKLy8C/dABp
Malware Config
Signatures
Files
-
1a5e8bf77403ae43bd773563f7e533264714d5b2efaaae8d70b541c066ed8eff.exe windows x86
91463b115fcca271f163d5d720f13d68
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
Imports
winspool.drv
ClosePrinter
kernel32
GetVersionExA
FreeLibrary
GetTempPathA
LoadLibraryA
GetModuleHandleW
CreateProcessA
DeleteFileA
GetVersionExA
CreateDirectoryA
GetFileAttributesA
GetCurrentProcessId
CompareStringA
InterlockedExchange
GetModuleHandleA
GetWindowsDirectoryA
GetSystemDirectoryA
FlushInstructionCache
VirtualQuery
GetVersion
SetLastError
CloseHandle
QueryPerformanceCounter
shell32
SHLimitInputEdit
ShellExecuteA
advapi32
RegQueryValueExW
RegOpenKeyExW
ElfOldestRecord
RegSetValueExW
RegCreateKeyExW
RegCloseKey
Sections
.text Size: 119KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 58KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ