Static task
static1
Behavioral task
behavioral1
Sample
d1309491108aac398ef125e15f0bcd7dd47af474bff80273167ee7e4b5614ca3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d1309491108aac398ef125e15f0bcd7dd47af474bff80273167ee7e4b5614ca3.exe
Resource
win10v2004-20220812-en
General
-
Target
d1309491108aac398ef125e15f0bcd7dd47af474bff80273167ee7e4b5614ca3
-
Size
824KB
-
MD5
0e46741a9d71caf721051bf3fbcb8e40
-
SHA1
9157b8348118287d4cf7786eabccbc1895c41cb4
-
SHA256
d1309491108aac398ef125e15f0bcd7dd47af474bff80273167ee7e4b5614ca3
-
SHA512
5e513d509586138241f5d8b6dacaec68e13908add4121437432e1baa089c078657738747c88b8200ed20a865bfffbafaa33d92b546c7c0397b61df9b623a593f
-
SSDEEP
12288:bYDN6FWgMFK7r5MTnHVTDjeIf2g4EMzZb7lyg1bnbqrG8ys9xKPXasMt391uF8lM:bYDNzQrejxf9MliTyOxwguGe03A
Malware Config
Signatures
Files
-
d1309491108aac398ef125e15f0bcd7dd47af474bff80273167ee7e4b5614ca3.exe windows x86
7d0e0461f9ac5faa387f4e4ee7c6a486
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenMutexW
LoadLibraryA
GetLongPathNameW
GetDriveTypeA
GetDriveTypeA
CreateMailslotW
HeapCreate
DeleteFileA
GetDriveTypeA
CompareStringA
GetDriveTypeA
GetDriveTypeA
GetDriveTypeA
GetConsoleTitleW
GetDriveTypeA
GetDriveTypeA
GetDriveTypeA
msxml6
DllCanUnloadNow
DllGetClassObject
DllUnregisterServer
DllRegisterServer
Sections
_text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.adata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ydata Size: 805KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ