Static task
static1
Behavioral task
behavioral1
Sample
604ec363f4f9aba6be3bf550b3f9903837282d9845ad79be361adaaee5133d26.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
604ec363f4f9aba6be3bf550b3f9903837282d9845ad79be361adaaee5133d26.exe
Resource
win10v2004-20220812-en
General
-
Target
604ec363f4f9aba6be3bf550b3f9903837282d9845ad79be361adaaee5133d26
-
Size
290KB
-
MD5
088c0a6afb4299da0d967f9427bb1f14
-
SHA1
f8420f5ff9870b5fcc64eb60bebbe157954c4bff
-
SHA256
604ec363f4f9aba6be3bf550b3f9903837282d9845ad79be361adaaee5133d26
-
SHA512
8cb2e8bd07580b66b8c87991d7e7f9be929dc55c4ee20054191093fea69406e1bf16c82476a90c31e7b74d1077602eca752c12ffbcd1aa1e13d64334af3d181d
-
SSDEEP
6144:NC/4OMTe7dShZ2zIcEBx38ksQhznwyDWRQXBP0XJlW8YA:MMTeAkzIcq3ORQXBkg8Y
Malware Config
Signatures
Files
-
604ec363f4f9aba6be3bf550b3f9903837282d9845ad79be361adaaee5133d26.exe windows x86
f9fb80cafbdb18f1d0f9548f4a719e74
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameW
QueryInformationJobObject
EnumSystemLanguageGroupsA
SetThreadExecutionState
GetFileTime
FindNextVolumeA
CompareStringA
DnsHostnameToComputerNameW
GetTimeZoneInformation
ResetEvent
Process32NextW
DefineDosDeviceW
GetFileType
GetNumberFormatA
CreateDirectoryW
ConvertDefaultLocale
EndUpdateResourceA
QueryPerformanceCounter
WritePrivateProfileStringW
SetNamedPipeHandleState
GetSystemDefaultUILanguage
SetVolumeMountPointA
FormatMessageA
SetFileApisToOEM
GetPrivateProfileStringA
GetProcessVersion
user32
EnableWindow
GetDCEx
ClientToScreen
Sections
.text Size: 197KB - Virtual size: 197KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 959B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ