Static task
static1
Behavioral task
behavioral1
Sample
b581b4b656f909b2078ccd07ec92726142fe687be550ab7e68c68330b91f3750.exe
Resource
win7-20220812-en
General
-
Target
b581b4b656f909b2078ccd07ec92726142fe687be550ab7e68c68330b91f3750
-
Size
69KB
-
MD5
36372eec32766a73d248f6e6f2d8a590
-
SHA1
215a422bc0efb7b303c083e9deee034d34d4c0db
-
SHA256
b581b4b656f909b2078ccd07ec92726142fe687be550ab7e68c68330b91f3750
-
SHA512
4f66e778473754ce1c3f85c9e6d931712c6aa5c640bc1f5a348c5f2a23cada885ee9fbcbeea70f729000a0e22fde2ce39686a87e9c0bc0bf883a373fc6e1dc25
-
SSDEEP
1536:gZxeCSzXkR7Osy6YNrbQOQGw9sKzo2nFWN1E+AwsP:gZxvY07OsyBQPKGsTE+UP
Malware Config
Signatures
Files
-
b581b4b656f909b2078ccd07ec92726142fe687be550ab7e68c68330b91f3750.exe windows x86
3f55af940c786b7b21a6107c1cc55f20
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpyW
ExitProcess
GetCommandLineW
SetPriorityClass
CreateProcessW
GetCurrentProcess
WaitForSingleObject
GetPriorityClass
GetExitCodeProcess
lstrcpynW
LocalAlloc
GetModuleFileNameW
CompareStringW
SetCurrentDirectoryW
lstrcmpiW
CloseHandle
LocalFree
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
LocalLock
GetFileAttributesW
lstrlenW
IsDebuggerPresent
user32
MessageBoxW
WaitForInputIdle
advapi32
OpenProcessToken
GetTokenInformation
shell32
CommandLineToArgvW
ShellExecuteExW
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 840B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.trdata Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE