Static task
static1
Behavioral task
behavioral1
Sample
305da531998b085871a22119739954aa3c487686fe6e9ab5be9b8339e4f1d85a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
305da531998b085871a22119739954aa3c487686fe6e9ab5be9b8339e4f1d85a.exe
Resource
win10v2004-20220901-en
General
-
Target
305da531998b085871a22119739954aa3c487686fe6e9ab5be9b8339e4f1d85a
-
Size
198KB
-
MD5
07029cf78b6930bd34e93ba92f1b203f
-
SHA1
b7c67ba6ddd0d9cb9729e8dceed394384fad5458
-
SHA256
305da531998b085871a22119739954aa3c487686fe6e9ab5be9b8339e4f1d85a
-
SHA512
5a809c6853bb38fa57ec92bf43c77b6ece10c43e6766b0d5c14ab96eddfb004213e824d731a3c1015f1876db1e2258d4d8524525a996415cd26c96b2b3c83447
-
SSDEEP
3072:9BjXIEsV66pRCzu4rOWj8n/4vR5y9pV1l0RU/Ra6Hc4EwKtwoZ1cYAs/dQ:gLJprqR5gTl0RUAvZ1cYAsV
Malware Config
Signatures
Files
-
305da531998b085871a22119739954aa3c487686fe6e9ab5be9b8339e4f1d85a.exe windows x86
37c505c1b6aaf94b20f1a83575ed2fc4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetSystemMetrics
GetDesktopWindow
CharNextA
GetDC
kernel32
GetTickCount
GetCurrentThreadId
GetProcessHeap
IsDebuggerPresent
GetWindowsDirectoryA
GetStartupInfoA
GetCurrentProcess
DeleteFileW
GetCommandLineA
lstrlenA
QueryPerformanceCounter
MulDiv
GetCurrentThread
GetLastError
Sleep
CopyFileA
RemoveDirectoryA
GetModuleHandleW
SetCurrentDirectoryA
lstrcmpiW
GetDriveTypeA
GetACP
GetCommandLineW
lstrlenW
GetOEMCP
GetThreadLocale
GetConsoleOutputCP
GlobalFindAtomW
LoadLibraryW
SetLastError
GlobalFindAtomA
lstrcmpiA
GetVersion
lstrcmpA
GetModuleHandleA
GetCurrentProcessId
DeleteFileA
GetUserDefaultLangID
VirtualAlloc
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ