Static task
static1
Behavioral task
behavioral1
Sample
2c708d44c8a5aea0d0d2165ec6ea30298e746d6f4815938bbc0f067843812415.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2c708d44c8a5aea0d0d2165ec6ea30298e746d6f4815938bbc0f067843812415.exe
Resource
win10v2004-20220812-en
General
-
Target
2c708d44c8a5aea0d0d2165ec6ea30298e746d6f4815938bbc0f067843812415
-
Size
66KB
-
MD5
10e6db0c310078e6648b6938526005e0
-
SHA1
cc7e51a900f4d18c2f9908695c684387d4efda3a
-
SHA256
2c708d44c8a5aea0d0d2165ec6ea30298e746d6f4815938bbc0f067843812415
-
SHA512
55ba53d7f1aea6418c42a98891fd9bfa71546836567598c989cdaf21ec291e83c92568d1f783259874d76bdaa08bb2c1b61f29c28a817f1ed05a24e86d5bdd9e
-
SSDEEP
1536:679lBzTt0mwrE3iLyDwB9xrSmtGUPCZRkrLAhfhjxmIKPpr:+9lBhwg8yklxF6RyLCfh1m3
Malware Config
Signatures
Files
-
2c708d44c8a5aea0d0d2165ec6ea30298e746d6f4815938bbc0f067843812415.exe windows x86
a3434e675d7038f7b432e18e29134a19
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateMailslotA
CreateDirectoryA
LocalUnlock
DeleteFileA
GetWindowsDirectoryW
GetLocalTime
GetVolumePathNameA
GetDefaultCommConfigW
QueryMemoryResourceNotification
Module32First
SetThreadContext
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE