Static task
static1
Behavioral task
behavioral1
Sample
110298967fe80f8223acf45dd23ac9453489f374dbec09077eed5412c46ebacc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
110298967fe80f8223acf45dd23ac9453489f374dbec09077eed5412c46ebacc.exe
Resource
win10v2004-20220812-en
General
-
Target
110298967fe80f8223acf45dd23ac9453489f374dbec09077eed5412c46ebacc
-
Size
36KB
-
MD5
0fbad416a981b94ca98048442a0aaa60
-
SHA1
3944058641731a365e7679d7620f4e2a8cd868dc
-
SHA256
110298967fe80f8223acf45dd23ac9453489f374dbec09077eed5412c46ebacc
-
SHA512
b8e5ec66ce6d212fa69d4107a6d54a4e61e4a6873541271ad00855477082e795c6ea7c7e3fa0a892f161816a31a4d22d5db51155468e4f71c0475eb85127c814
-
SSDEEP
768:KAwestu2WfpHlgzsl0Om2gJ4CFgHdGAAE3V8KHMlGiLw6oY8+dFf:xstu2WfpHKwdouVHUsVRMlGizZdx
Malware Config
Signatures
Files
-
110298967fe80f8223acf45dd23ac9453489f374dbec09077eed5412c46ebacc.exe windows x86
7ce72da8f1739e6febc7251a933c82a1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadStringW
ntdll
RtlOemStringToUnicodeString
wcschr
RtlInitUnicodeString
RtlUnicodeStringToOemString
RtlInitString
msvcrt
__p__fmode
__set_app_type
__p__commode
_controlfp
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__initenv
exit
_cexit
_XcptFilter
_exit
_c_exit
_except_handler3
kernel32
WriteFile
GetModuleHandleA
GetConsoleOutputCP
GetSystemDefaultLangID
SetThreadLocale
GetFileAttributesW
SetCurrentDirectoryW
GetCurrentDirectoryW
GetEnvironmentVariableW
SearchPathW
CreateProcessW
WaitForSingleObject
GetExitCodeProcess
CloseHandle
GetStdHandle
ExitProcess
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE