Static task
static1
Behavioral task
behavioral1
Sample
47af9fda18f866e1e63714a48514496719c31d7eba6e148dfbd377bf33814ba4.exe
Resource
win7-20220812-en
General
-
Target
47af9fda18f866e1e63714a48514496719c31d7eba6e148dfbd377bf33814ba4
-
Size
278KB
-
MD5
0e83fbea2ea28ef1244233d54d39112b
-
SHA1
c1a7a03c3702397760318826f4f817325bbb1a26
-
SHA256
47af9fda18f866e1e63714a48514496719c31d7eba6e148dfbd377bf33814ba4
-
SHA512
c4b032db4843075b326c8f5d00a7b934c1dc60baf355ef9a624510688cc264b9291c62a9b830fb0a6f1a271d24d4aa88950bfc88491c5ee1ec43b06f2621757a
-
SSDEEP
6144:/q/SPPZWVa9VLadEvnKyXWC3PvowkoEpPR0lHQdBy2xXMSau:iKnZWVyVAEwDhkedBy2xXd
Malware Config
Signatures
Files
-
47af9fda18f866e1e63714a48514496719c31d7eba6e148dfbd377bf33814ba4.exe windows x86
dec2da67f0a3c08955bcaf578c9411c0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
LCMapStringA
GlobalFindAtomA
WideCharToMultiByte
IsBadCodePtr
LCMapStringW
VirtualProtect
GetFileAttributesA
GetDiskFreeSpaceA
GetFullPathNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
GetEnvironmentStringsW
CreateFileA
UnhandledExceptionFilter
GetStringTypeA
GetOEMCP
EnumResourceNamesW
GetThreadLocale
SetFilePointer
FlushFileBuffers
SetStdHandle
WriteFile
ReadFile
IsBadReadPtr
GetCPInfo
GetStringTypeExA
SetUnhandledExceptionFilter
FindFirstFileA
GetStringTypeW
FreeEnvironmentStringsW
MulDiv
shlwapi
SHGetInverseCMAP
PathAppendA
PathIsFileSpecA
PathIsContentTypeA
SHCreateStreamOnFileEx
PathCreateFromUrlW
rpcrt4
RpcStringFreeA
Sections
.text Size: 132KB - Virtual size: 264KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 142KB - Virtual size: 142KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ