Static task
static1
Behavioral task
behavioral1
Sample
901bd3439cebe6adf281d98c21fa85885dedab178623f86ead61cd702ea0e014.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
901bd3439cebe6adf281d98c21fa85885dedab178623f86ead61cd702ea0e014.exe
Resource
win10v2004-20220812-en
General
-
Target
901bd3439cebe6adf281d98c21fa85885dedab178623f86ead61cd702ea0e014
-
Size
748KB
-
MD5
0ebd444892008b7c939d39989699f720
-
SHA1
3f0537b2d89315516062fbe42d3a12402f9c0cd9
-
SHA256
901bd3439cebe6adf281d98c21fa85885dedab178623f86ead61cd702ea0e014
-
SHA512
f6f7b334437eef46b9fc024474272c6a0b682a332b14dcf7483ac8737c3f3411a1083cdee7b589c2cb02fea8e135d20f9c0e5c9a6511e13fc1b1cf7c4dd4f2f9
-
SSDEEP
12288:wRfY4kAzlK6PJRVUmZM1vehe3AqmnTxUQym9vB0AnLpXdfyRTlnpvCq+Ws2sohct:ofYelnRReUw2wAqCGQymH0ALpXdqRzCR
Malware Config
Signatures
Files
-
901bd3439cebe6adf281d98c21fa85885dedab178623f86ead61cd702ea0e014.exe windows x86
e03992befdd77c118813503b50835cc4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreatePipe
GetFileType
SetVolumeLabelA
CreateDirectoryA
WaitForMultipleObjects
GetProcessHeap
WriteFile
GetModuleHandleA
SetEndOfFile
ExitThread
HeapFree
RemoveDirectoryA
AddAtomA
GetModuleFileNameA
DeleteAtom
RemoveDirectoryA
HeapCreate
FindAtomA
FindClose
CreateSemaphoreW
ClearCommBreak
GetCommandLineA
GetDriveTypeW
IsBadWritePtr
CloseHandle
clbcatq
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
msvidc32
DriverProc
DriverProc
DriverProc
DriverProc
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 740KB - Virtual size: 740KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE