Static task
static1
Behavioral task
behavioral1
Sample
13fde14feed08f2de78767f740fe713f7f3e82850a4ba0f12a2f99ebcd8cd598.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
13fde14feed08f2de78767f740fe713f7f3e82850a4ba0f12a2f99ebcd8cd598.exe
Resource
win10v2004-20220812-en
General
-
Target
13fde14feed08f2de78767f740fe713f7f3e82850a4ba0f12a2f99ebcd8cd598
-
Size
830KB
-
MD5
095a01ad1299487f946f335be0862a91
-
SHA1
caa4c5353f8bbd5ff72577afe86fac73aa0ac26e
-
SHA256
13fde14feed08f2de78767f740fe713f7f3e82850a4ba0f12a2f99ebcd8cd598
-
SHA512
48b237dace79653a8a657d7371d49fef7b4857fe636f2b901c4c99ae89c4de9163fa229ac598ded6f652c5fa931a80a114056f22af8e6cb694116633ada3ecee
-
SSDEEP
24576:xP3by6l3EYzITv//S896MtcMszt0NAyzktM75cExE1cW6:FrbEYzIr/vcMat0OyUYbOq
Malware Config
Signatures
Files
-
13fde14feed08f2de78767f740fe713f7f3e82850a4ba0f12a2f99ebcd8cd598.exe windows x86
bcc8bfb66db9677962bdbec2f987894c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateSemaphoreW
GetModuleHandleA
MoveFileExA
WaitForSingleObject
CompareStringA
LeaveCriticalSection
GetTickCount
HeapCreate
GetCommandLineA
GetDiskFreeSpaceA
GetConsoleTitleA
EnumResourceNamesA
FindNextFileW
EnumCalendarInfoA
GetLocaleInfoA
GetCurrentProcess
SetEvent
drmv2clt
MakeEscapedURL
CreateDRMRightsManager
LaunchURL
DllRegisterServer
Sections
.text1 Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 813KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ