Static task
static1
Behavioral task
behavioral1
Sample
da9b67883646387bd0e026485bfa6e10b6858754d764566818b34a95362e16ed.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
da9b67883646387bd0e026485bfa6e10b6858754d764566818b34a95362e16ed.exe
Resource
win10v2004-20220812-en
General
-
Target
da9b67883646387bd0e026485bfa6e10b6858754d764566818b34a95362e16ed
-
Size
289KB
-
MD5
07580efe5490c5a4592982d6f0d87850
-
SHA1
7509748d0fb450491db30e45e1f4d205e79ee3f2
-
SHA256
da9b67883646387bd0e026485bfa6e10b6858754d764566818b34a95362e16ed
-
SHA512
c0443277d26c7ad398ac3866e8257729e6e6e51259d1d2fd7164b6679436f292d7b0603d2fd689f0a82e30470fa16e6c104a1c7e1feeb05418bce653cf5d3792
-
SSDEEP
6144:SAuUmgxOoVKiigvsCiOlTTLGTNBYDEINDLqinL86xqWJ/:SAueKiigk3ONTsBYDEI5N3l/
Malware Config
Signatures
Files
-
da9b67883646387bd0e026485bfa6e10b6858754d764566818b34a95362e16ed.exe windows x86
043db86002c329aa2d3a44f642f9efd8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
w32topl
ToplScheduleCacheCreate
ToplSTHeapDestroy
ToplScheduleDuration
ToplScheduleCacheDestroy
ToplSTHeapInit
ToplSTHeapExtractMin
ToplScheduleCreate
ToplScheduleExportReadonly
fmifs
DiskCopy
FormatEx
Format
ComputeFmMediaType
Extend
EnableVolumeCompression
Chkdsk
kernel32
FindResourceW
lstrcmpA
SystemTimeToFileTime
CreateFileA
GetOEMCP
GetLocalTime
GetCurrentProcess
QueryPerformanceCounter
MultiByteToWideChar
SetLastError
GetProcessHeap
GetTickCount
lstrcpyW
HeapAlloc
SetUnhandledExceptionFilter
LoadLibraryA
CloseHandle
GetSystemTimeAsFileTime
HeapFree
GetCurrentProcessId
WideCharToMultiByte
GetLocaleInfoW
Sections
.text Size: 273KB - Virtual size: 304KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.isdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ