Static task
static1
Behavioral task
behavioral1
Sample
5b79374e7b8294c987c4ce8b3c808c3ad75b99d4189f62b458be20599000c15a.exe
Resource
win7-20220812-en
General
-
Target
5b79374e7b8294c987c4ce8b3c808c3ad75b99d4189f62b458be20599000c15a
-
Size
589KB
-
MD5
07cfb050aef0f3fea33368e98cf78180
-
SHA1
93a59ce0326662c5309347a9a7cbfe15168fee7d
-
SHA256
5b79374e7b8294c987c4ce8b3c808c3ad75b99d4189f62b458be20599000c15a
-
SHA512
4d1cee6cf992ebb8e6ae31ed4ff3fd0562a52693168cd947b2e2cf4de17cac2bd36a99a1daa5787c625b761cae52b051a15a928ce13e33f0af8e55fbd019b956
-
SSDEEP
12288:XRmyv6AcC9vH1sOYlgVkJ3KMtJz65HUk:Xsq6A99vH1sOYKSJD765H
Malware Config
Signatures
Files
-
5b79374e7b8294c987c4ce8b3c808c3ad75b99d4189f62b458be20599000c15a.exe windows x86
5551e22c691f568074037cd150b9a0ac
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
GetProcessHeap
HeapFree
MapViewOfFile
CloseHandle
CreateFileMappingW
CreateFileW
UnmapViewOfFile
SetEvent
DuplicateHandle
GetCurrentProcess
GetModuleFileNameW
Sleep
OpenProcess
GetCommandLineW
TerminateThread
GetExitCodeThread
CreateThread
HeapSetInformation
SetErrorMode
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
IsDebuggerPresent
psapi
GetMappedFileNameW
QueryWorkingSet
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 844B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 580KB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE