Static task
static1
Behavioral task
behavioral1
Sample
8010885b5c0c5380f984dba72a4facaa10bf4bade8eff2c7bbff2c90313987a3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8010885b5c0c5380f984dba72a4facaa10bf4bade8eff2c7bbff2c90313987a3.exe
Resource
win10v2004-20220812-en
General
-
Target
8010885b5c0c5380f984dba72a4facaa10bf4bade8eff2c7bbff2c90313987a3
-
Size
301KB
-
MD5
0c32cd2a5c6b9a2092d3ee8cdf2a6f68
-
SHA1
c256793df874651f27325d36db8395378d1f9511
-
SHA256
8010885b5c0c5380f984dba72a4facaa10bf4bade8eff2c7bbff2c90313987a3
-
SHA512
cfd4e86dcf8243b14a7477052724aa3cb39bcd95c779f22da948a4e475063da3316212367d21f08d985cc3be6822292b566a54629cbd6cf7fa2c3fab73d5cea6
-
SSDEEP
6144:qdcbBWKxdj2A1YEW7rRJoQV57u0Bw1kdzzdNmRum:qdcbBfxwA1YE46QVs0BVLQN
Malware Config
Signatures
Files
-
8010885b5c0c5380f984dba72a4facaa10bf4bade8eff2c7bbff2c90313987a3.exe windows x86
a04d180f855fd7690456f44d63731d25
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiW
GetProcessHeap
DeleteFileA
HeapCreate
GetCommState
Sleep
lstrlenA
lstrcmpiW
lstrcmpiW
GetLogicalDriveStringsW
GetStartupInfoA
IsValidLocale
GetModuleFileNameA
GetStdHandle
GetVolumePathNameW
SetLastError
GetModuleHandleA
CreateNamedPipeW
CreateMailslotW
GetConsoleAliasW
lstrcmpiW
FileTimeToLocalFileTime
lstrcmpiW
sqlunirl
AbortSystemShutdown_
_AppendMenu_@16
_CallMsgFilter_@8
wsprintf_
Sections
.text Size: 1KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.orpc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 294KB - Virtual size: 293KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ