Static task
static1
Behavioral task
behavioral1
Sample
98f700964415dadd6f388d90da660fae51dfb4ee7824d7c5c0d21ae323eab48d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
98f700964415dadd6f388d90da660fae51dfb4ee7824d7c5c0d21ae323eab48d.exe
Resource
win10v2004-20220812-en
General
-
Target
98f700964415dadd6f388d90da660fae51dfb4ee7824d7c5c0d21ae323eab48d
-
Size
380KB
-
MD5
09d4dbbdf0d8e5e1d48f1661cc6b4760
-
SHA1
181b74b770f15409081c7fb76802e0853ba458e5
-
SHA256
98f700964415dadd6f388d90da660fae51dfb4ee7824d7c5c0d21ae323eab48d
-
SHA512
3eb6d5c6de4f3f679625eced5551b882f944b394cdd76827facfe49902e75042d19fe27ed1d1bb27775259dec74ce0725689a986bc6549a41902eaef01228be3
-
SSDEEP
6144:Pb41nDY6RZ+Pl9Mx0BeY6LCMXRdveOqvQ2w9Z5xntrGtccvsBfDv+LmOQicM:P8dZ6Mx0UYRMXDveDQ2+tckBbmLmOKM
Malware Config
Signatures
Files
-
98f700964415dadd6f388d90da660fae51dfb4ee7824d7c5c0d21ae323eab48d.exe windows x86
5e01feb0c8712b4079282e56efc8078d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
LoadLibraryExA
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetLastError
lstrlenA
CreateFileA
GetModuleFileNameA
ntdll
RtlLengthSid
RtlInitUnicodeString
RtlFreeHeap
RtlAllocateHeap
advapi32
RegOpenKeyExA
LsaClose
RegSetValueExA
RegQueryValueExA
RegCloseKey
LsaOpenPolicy
ulib
?GetLexeme@ARGUMENT@@QAEPAVWSTRING@@XZ
??0DSTRING@@QAE@XZ
??0PATH@@QAE@XZ
??0STRING_ARGUMENT@@QAE@XZ
??0ARRAY@@QAE@XZ
??0ARGUMENT_LEXEMIZER@@QAE@XZ
??1PROGRAM@@UAE@XZ
?ValidateVersion@PROGRAM@@UBEXKK@Z
?Usage@PROGRAM@@UBEXXZ
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 131KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_MEM_READ