Static task
static1
Behavioral task
behavioral1
Sample
417d235f12e8e7901140f0f7218fa993f27256b70b99def6a0eb5a5ac9ff5acc.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
417d235f12e8e7901140f0f7218fa993f27256b70b99def6a0eb5a5ac9ff5acc.exe
Resource
win10v2004-20220812-en
General
-
Target
417d235f12e8e7901140f0f7218fa993f27256b70b99def6a0eb5a5ac9ff5acc
-
Size
187KB
-
MD5
8315452376df44f14cca47b0c787da21
-
SHA1
b30169d697c56a47638240e7eb393913c96d907b
-
SHA256
417d235f12e8e7901140f0f7218fa993f27256b70b99def6a0eb5a5ac9ff5acc
-
SHA512
0634b339c20984401bbcc03b188c90f104eb73c9205227490f44206cf2f1f34b60b26c671d55a867da90638832c736f17ca0991abdc25aa4397c1b67f5f7df3d
-
SSDEEP
3072:+xbnkOSiUOlKINlfslQ8bO9dMeR7v1L5qDNSO91ha41QKondgm9yurR0:ATEOlKI3slQ/9d1T1An1hF+gerG
Malware Config
Signatures
Files
-
417d235f12e8e7901140f0f7218fa993f27256b70b99def6a0eb5a5ac9ff5acc.exe windows x86
c0f650b8e045078501b172795be63f75
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetFolderPathW
kernel32
GetVersionExA
WideCharToMultiByte
GetTempPathW
WriteFile
lstrlenA
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
FreeLibrary
GetProcAddress
LoadLibraryA
LoadLibraryW
GetTickCount
GetTempPathA
ResetEvent
WaitForSingleObject
SetEvent
Sleep
GetTimeZoneInformation
FileTimeToSystemTime
OutputDebugStringA
lstrcpyA
GetFullPathNameA
GetFullPathNameW
IsDBCSLeadByte
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateThread
InterlockedExchange
GetDiskFreeSpaceExA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
CreateSemaphoreA
ole32
CoCreateObjectInContext
OleIsCurrentClipboard
GetErrorInfo
CoTaskMemFree
CoTaskMemAlloc
Sections
.text Size: 114KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 62B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ