Static task
static1
Behavioral task
behavioral1
Sample
4a56cda3b76121cf43c7022c7840fec23fb3a1c3d8e0177620c02ce4352a8cb2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4a56cda3b76121cf43c7022c7840fec23fb3a1c3d8e0177620c02ce4352a8cb2.exe
Resource
win10v2004-20220812-en
General
-
Target
4a56cda3b76121cf43c7022c7840fec23fb3a1c3d8e0177620c02ce4352a8cb2
-
Size
76KB
-
MD5
0795cd0f19c22002a9d246318cc97383
-
SHA1
18ede995034f175c04a7b050c55d8d1363bc184d
-
SHA256
4a56cda3b76121cf43c7022c7840fec23fb3a1c3d8e0177620c02ce4352a8cb2
-
SHA512
29faa5190552ad8cd5e8684e587aab8d0c68637b96110a3e175ee4624cd78033f4e7025d88fef154522a81a964b45f9cd9a5af981a895c928f27e029e00f1e91
-
SSDEEP
1536:1C1UNvWPE40DJurd1Am6bK5gFnMmzs62LnpjVrs2ryrd1vUQuq6:9r4GJbmZ5g+6mHs2qo
Malware Config
Signatures
Files
-
4a56cda3b76121cf43c7022c7840fec23fb3a1c3d8e0177620c02ce4352a8cb2.exe windows x86
7ad69c5df9117ca8d503bc57e2ce4496
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteAtom
GetProfileSectionA
FindNextVolumeMountPointW
CancelIo
GetLogicalDriveStringsA
VirtualProtect
SetHandleInformation
SetThreadPriorityBoost
CreateThread
GetThreadPriority
DeleteTimerQueueTimer
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.brdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE