Static task
static1
Behavioral task
behavioral1
Sample
24e088b124ec29e68bbf13814171342d6fe75ce70c9c7b558ac1f0d443c57ab7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
24e088b124ec29e68bbf13814171342d6fe75ce70c9c7b558ac1f0d443c57ab7.exe
Resource
win10v2004-20220812-en
General
-
Target
24e088b124ec29e68bbf13814171342d6fe75ce70c9c7b558ac1f0d443c57ab7
-
Size
748KB
-
MD5
0f34bb4b9c71770d1bf34ea9c5532f60
-
SHA1
14e48cbe7d766759de9ae620b2dbafdde14136fb
-
SHA256
24e088b124ec29e68bbf13814171342d6fe75ce70c9c7b558ac1f0d443c57ab7
-
SHA512
997e1447a15ea6c2ec0534d5ef52ba6725c92e418b232c82f30c75d5d459986ac5e860c4876a25a83561e3e8153f7c0686c9f12225922535ac5ab4fd4d17feb9
-
SSDEEP
12288:lscPQsck8hJ82ycQr6Lg7u8pywZHsBiAzk+yOZNSOe40JjV83xRXT:RgD0hO06bC6iAzk+y6e413/j
Malware Config
Signatures
Files
-
24e088b124ec29e68bbf13814171342d6fe75ce70c9c7b558ac1f0d443c57ab7.exe windows x86
99205ac337d8244b0524fb77ca91bcbc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateSemaphoreW
WriteFile
SetVolumeLabelA
SetEndOfFile
CreateDirectoryA
HeapCreate
AddAtomA
WaitForMultipleObjects
RemoveDirectoryA
GetProcessHeap
GetFileType
ExitThread
FindClose
CloseHandle
GetDriveTypeW
HeapFree
FindAtomA
DeleteAtom
CreatePipe
GetModuleHandleA
IsBadWritePtr
ClearCommBreak
RemoveDirectoryA
GetModuleFileNameA
GetCommandLineA
clbcatq
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
msvidc32
DriverProc
DriverProc
DriverProc
DriverProc
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 740KB - Virtual size: 740KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE