Static task
static1
Behavioral task
behavioral1
Sample
faa485881f9fb00aee908249deb27e64b56741df3070c93f6f7184bc32a12fc1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
faa485881f9fb00aee908249deb27e64b56741df3070c93f6f7184bc32a12fc1.exe
Resource
win10v2004-20220812-en
General
-
Target
faa485881f9fb00aee908249deb27e64b56741df3070c93f6f7184bc32a12fc1
-
Size
31KB
-
MD5
09550e34276f309c546998079ee36290
-
SHA1
e35c8cba4c2c7d404bbe8479f84c81983e4482cf
-
SHA256
faa485881f9fb00aee908249deb27e64b56741df3070c93f6f7184bc32a12fc1
-
SHA512
3093abdff2d0a66ed1bea18f4128eb28b5830a2d3cdbb88804523b8180bde8e765b60f88d12f3f07a011d24426d39277d39f6dc063ddfbf8426e435ff678a62a
-
SSDEEP
384:U+Wek7hAVgopnZWGVWvWpnWJ6gNNONw8HqVyybfAkxljIXDGE0nft:U+W9ypN7wjON1HCfnjI6E0F
Malware Config
Signatures
Files
-
faa485881f9fb00aee908249deb27e64b56741df3070c93f6f7184bc32a12fc1.exe windows x86
a4efbf89b80e444ba42d503698698324
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__set_app_type
_except_handler3
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__initenv
exit
_cexit
_XcptFilter
_exit
_c_exit
sprintf
_strlwr
malloc
putchar
_controlfp
printf
kernel32
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
DeviceIoControl
FormatMessageW
WideCharToMultiByte
CloseHandle
CreateFileA
GetModuleHandleA
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE