Static task
static1
Behavioral task
behavioral1
Sample
263d60caad864c7df7217e9db4675933bfc31ca33ef0f08580e2763c53b3978d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
263d60caad864c7df7217e9db4675933bfc31ca33ef0f08580e2763c53b3978d.exe
Resource
win10v2004-20220901-en
General
-
Target
263d60caad864c7df7217e9db4675933bfc31ca33ef0f08580e2763c53b3978d
-
Size
238KB
-
MD5
8265b69651b6d1e171ef5aaba3d8ea51
-
SHA1
eac3105f1c0f25f9cf2fa1d3dbe6ce7c3ea5adc8
-
SHA256
263d60caad864c7df7217e9db4675933bfc31ca33ef0f08580e2763c53b3978d
-
SHA512
909264a6bf65aa708c029947a3b07a73955be4bc2b2b434617dfc684ffc86dee0e7b6532c0ad7a33732f06c24a8d7150616cc7e5fdf5673721cff4fbcd2cc132
-
SSDEEP
3072:PGXKi8M3qCDFFkl1v7QwpASBNLMVgjlfjm3AqfjVhfwW1+2atMKm7zb9fSxYivo/:+P8M3qCp0x712VEazrYuaCvuYiEJJ
Malware Config
Signatures
Files
-
263d60caad864c7df7217e9db4675933bfc31ca33ef0f08580e2763c53b3978d.exe windows x86
48bca475f4a8154d94adb956a0a2daba
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetUserDefaultLangID
GetModuleHandleA
VirtualProtect
GetConsoleAliasW
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetProcessHeap
GetModuleHandleW
CreateProcessA
GetTempFileNameA
HeapFree
HeapAlloc
LoadLibraryW
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetLastError
GlobalFree
GlobalUnlock
oleaut32
DispGetIDsOfNames
DispGetIDsOfNames
SafeArraySetIID
CreateErrorInfo
SafeArrayAllocDescriptorEx
GetErrorInfo
SetErrorInfo
GetActiveObject
VariantInit
SysFreeString
oledlg
OleUIBusyA
Sections
.text Size: 141KB - Virtual size: 185KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 94KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE