Static task
static1
Behavioral task
behavioral1
Sample
430f5879ee241710c54d78a76c0190712b47a50b9837539098c7423d0dbe65c8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
430f5879ee241710c54d78a76c0190712b47a50b9837539098c7423d0dbe65c8.exe
Resource
win10v2004-20220812-en
General
-
Target
430f5879ee241710c54d78a76c0190712b47a50b9837539098c7423d0dbe65c8
-
Size
23KB
-
MD5
07a9ab3f971595c316924f953d2f0010
-
SHA1
8a10a26d2f0fd7e0a3049f5b34df7bc83c5c1c05
-
SHA256
430f5879ee241710c54d78a76c0190712b47a50b9837539098c7423d0dbe65c8
-
SHA512
b61d7d25a2ab168c7884de7ab169c3c7a1c221da3ef001b5135321d7ade1e2b0c3aca24ae09ba9b4d65e531743e2f959ea4615e692182b5b512d20354e62cf38
-
SSDEEP
384:v6dVaswW1NYtqFYbM1McAf2RlrUzq1x8Yjr7HKYI9JABpU4rQO9C1EP+p:v6VNeqFYxcAf2wmH7jr2R0Nr/1
Malware Config
Signatures
Files
-
430f5879ee241710c54d78a76c0190712b47a50b9837539098c7423d0dbe65c8.exe windows x86
a43a38512da1f8b15e273b7213ff70e7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxW
kernel32
GetModuleHandleA
SetUnhandledExceptionFilter
GetCurrentProcess
CloseHandle
LocalFree
FormatMessageW
GetLastError
CreateProcessW
GetSystemDirectoryW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
msvcrt
_c_exit
swprintf
_XcptFilter
_cexit
exit
__initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_exit
ntdll
NtQueryInformationProcess
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE