Static task
static1
Behavioral task
behavioral1
Sample
1c14c8fa481c7983477c6791dc877926a78af7868ff141ad9e03d44e7a8df494.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1c14c8fa481c7983477c6791dc877926a78af7868ff141ad9e03d44e7a8df494.exe
Resource
win10v2004-20220901-en
General
-
Target
1c14c8fa481c7983477c6791dc877926a78af7868ff141ad9e03d44e7a8df494
-
Size
320KB
-
MD5
07aff59f63fab07895ab15eeaa0ff470
-
SHA1
462255ec9fa3f3d91ed4d6daa19ec544510608e0
-
SHA256
1c14c8fa481c7983477c6791dc877926a78af7868ff141ad9e03d44e7a8df494
-
SHA512
7de8aa97bc56b9ddb589fe671964799438a7d970adba557199bf20164a6067ca64a0b55adb084c8b75a52f199a3c81492bdb2ba6a692e1d8a5a21ee7a6e7fb55
-
SSDEEP
6144:kFgVM61nGDFi7H2RfS155ONNXBuWoJBO9OMbHLkAqF7Ief9UmM7/uT:4wM8GDFiz2EB0NxDIBuOFe7/uT
Malware Config
Signatures
Files
-
1c14c8fa481c7983477c6791dc877926a78af7868ff141ad9e03d44e7a8df494.exe windows x86
2c71aa6a5a986ec2b49a76352db3925b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetConsoleCursorPosition
PrivMoveFileIdentityW
DuplicateHandle
CreateProcessA
EnumUILanguagesW
GetStringTypeW
GetNumaProcessorNode
lstrcpyn
WTSGetActiveConsoleSessionId
FreeVirtualBuffer
GetNamedPipeHandleStateA
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.brdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tc Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE