Static task
static1
Behavioral task
behavioral1
Sample
327fce22cdb99e23ad9e55b52afb68d16632090483be6ac710beae20e6221c1e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
327fce22cdb99e23ad9e55b52afb68d16632090483be6ac710beae20e6221c1e.exe
Resource
win10v2004-20220812-en
General
-
Target
327fce22cdb99e23ad9e55b52afb68d16632090483be6ac710beae20e6221c1e
-
Size
48KB
-
MD5
0ef404e31f32bdb165a81a0662a514d0
-
SHA1
6567dafc4595e9218b7677ba714b425ba8db8a53
-
SHA256
327fce22cdb99e23ad9e55b52afb68d16632090483be6ac710beae20e6221c1e
-
SHA512
32ff89eced8b45f2ec3c9ea81dfa5f8ed4607ff501aab39e1a20c473fa0dbd208de96d5360bc18b233e115453cfa436df9076153edbdebb6414c747e522ffdcd
-
SSDEEP
384:6mVasfW1ZevZWpW+SK7CU9PCu6jzEylcZ6u2OAORYt0zhxy8Uu99/Jn1/s1xnipg:6qN4pW+SmC8H6pcZMOA2iubhpiQu
Malware Config
Signatures
Files
-
327fce22cdb99e23ad9e55b52afb68d16632090483be6ac710beae20e6221c1e.exe windows x86
a43a38512da1f8b15e273b7213ff70e7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxW
kernel32
GetModuleHandleA
SetUnhandledExceptionFilter
GetCurrentProcess
CloseHandle
LocalFree
FormatMessageW
GetLastError
CreateProcessW
GetSystemDirectoryW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
msvcrt
_c_exit
swprintf
_XcptFilter
_cexit
exit
__initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_exit
ntdll
NtQueryInformationProcess
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE