Static task
static1
Behavioral task
behavioral1
Sample
108fcc561753429bbc9dc8b71fc2487beea393e1b17b13758fcb24996ab67641.exe
Resource
win7-20220812-en
General
-
Target
108fcc561753429bbc9dc8b71fc2487beea393e1b17b13758fcb24996ab67641
-
Size
1.4MB
-
MD5
2ced4ec1320ed267f4691cb0df229750
-
SHA1
f47fa98de8fdd5c7b920ed63d0600cd1a20887a3
-
SHA256
108fcc561753429bbc9dc8b71fc2487beea393e1b17b13758fcb24996ab67641
-
SHA512
8dbec91a4952185bdb7e1752d2734a2fb69326dc3996356f25bd6e4397a7aaf7728697aaf4282fef12d079f5e560744b48f42ee3367af6d983cb78c80ab853d1
-
SSDEEP
24576:1hW6sWEMxOutKIZXFQuCwdY9/JuBIZ0aemzf8gNSpE2/7wdaLv0SM0GI7/YcFurb:1kM9KSVQuCssTeOypEc7ocgINF
Malware Config
Signatures
Files
-
108fcc561753429bbc9dc8b71fc2487beea393e1b17b13758fcb24996ab67641.exe windows x86
0c7919a3ef8876e454f611ff94971630
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesA
FormatMessageA
RemoveDirectoryA
DeleteFileA
TerminateProcess
SetEvent
SetEnvironmentVariableA
GetEnvironmentVariableA
WideCharToMultiByte
HeapAlloc
ReadFile
CreateFileA
ExitProcess
GetLastError
WriteFile
CloseHandle
SetFilePointer
GetExitCodeProcess
CreateProcessA
GetCurrentDirectoryA
GetDiskFreeSpaceA
HeapFree
WaitForSingleObject
CreateThread
CreateEventA
GetCommandLineA
GetModuleFileNameA
GetProcessHeap
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
CreateDirectoryA
GetDriveTypeA
user32
SendDlgItemMessageA
SendMessageA
EndDialog
LoadStringA
DialogBoxParamA
ShowWindow
MessageBoxA
comctl32
ord17
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zero Size: - Virtual size: 66KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.3MB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.9zero Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE