Static task
static1
Behavioral task
behavioral1
Sample
a4a2556bb4e94c547275ec4c9bd8070741700b093da093af7c6eb6c3793f38f8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a4a2556bb4e94c547275ec4c9bd8070741700b093da093af7c6eb6c3793f38f8.exe
Resource
win10v2004-20220812-en
General
-
Target
a4a2556bb4e94c547275ec4c9bd8070741700b093da093af7c6eb6c3793f38f8
-
Size
295KB
-
MD5
0e6b26c05a367764e0d59dab1db8bcc0
-
SHA1
88f283b9b92cad86973becbaf640f787b7617fca
-
SHA256
a4a2556bb4e94c547275ec4c9bd8070741700b093da093af7c6eb6c3793f38f8
-
SHA512
7ca82c5e2d6f13f151da0c5be07f8b9a8f2a60eae29ae21a7f576997660d85bb426ddc2716eb3643f29fcb2cec2598128284c446cecb60d16ca2ec17c4b68059
-
SSDEEP
6144:i+p8WekCUsQC+rnb4il6/sjmreyjnXD9W8ijt0OK1Nd7:/VhCUsf+whrpzA8s0nL7
Malware Config
Signatures
Files
-
a4a2556bb4e94c547275ec4c9bd8070741700b093da093af7c6eb6c3793f38f8.exe windows x86
eed3abd0309cef04541a749aa3cbe558
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
w32topl
ToplScheduleExportReadonly
ToplSTHeapDestroy
ToplScheduleCreate
ToplScheduleCacheDestroy
ToplScheduleCacheCreate
ToplSTHeapInit
ToplSTHeapExtractMin
ToplScheduleDuration
kernel32
WideCharToMultiByte
LoadLibraryA
GetUserDefaultLCID
GetTickCount
SetUnhandledExceptionFilter
GetOEMCP
GetCurrentProcessId
CreateFileA
QueryPerformanceCounter
GetLocalTime
lstrcpyW
MultiByteToWideChar
GetCurrentProcess
CloseHandle
HeapAlloc
GetSystemTimeAsFileTime
SystemTimeToFileTime
GetProcessHeap
HeapFree
lstrcmpA
GetSystemDefaultLangID
SetLastError
fmifs
Format
Chkdsk
Extend
EnableVolumeCompression
DiskCopy
FormatEx
Sections
.text Size: 129KB - Virtual size: 340KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.iata Size: 159KB - Virtual size: 161KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ