Static task
static1
Behavioral task
behavioral1
Sample
22af43ec66f14423f115d467a68f4360da9e572143ad5cf206f16be83f0545d3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
22af43ec66f14423f115d467a68f4360da9e572143ad5cf206f16be83f0545d3.exe
Resource
win10v2004-20220812-en
General
-
Target
22af43ec66f14423f115d467a68f4360da9e572143ad5cf206f16be83f0545d3
-
Size
102KB
-
MD5
05498ec3dfe261db588aac1d81856cc7
-
SHA1
f67f931a3eac46ce3a0a9c3ad221a06547661bda
-
SHA256
22af43ec66f14423f115d467a68f4360da9e572143ad5cf206f16be83f0545d3
-
SHA512
1601685e1ede12b329c9a3dc5cb860ed3096640e5d1f62bebef7757e0ca1389d127be34431a724566eec3cdb36b75c214f1f1d7b7e3c727b1efd52a37ebd80ca
-
SSDEEP
1536:7Mt1oKo5PQrvJLW91ZVHr0O1agSyg8cvoO+zhGh8Lr3d3/s1nEuf/k+bs:7vLuJi91ZVoCSFjwOuGSLrNqEe/vbs
Malware Config
Signatures
Files
-
22af43ec66f14423f115d467a68f4360da9e572143ad5cf206f16be83f0545d3.exe windows x86
05f124d3fa2cab5d0a58523c272d4cd6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__p__commode
__set_app_type
_controlfp
_exit
__getmainargs
_initterm
_except_handler3
_adjust_fdiv
_XcptFilter
__p___initenv
__p__fmode
kernel32
FlushFileBuffers
GetPrivateProfileStringA
GetModuleHandleA
GetCurrentProcessId
SetFileAttributesA
GetConsoleMode
MulDiv
MoveFileA
lstrlenA
GetLocalTime
LoadLibraryW
WriteConsoleA
SetHandleCount
GetTempPathA
GetDiskFreeSpaceA
SetThreadLocale
GetDriveTypeA
GetCurrentProcess
GetExitCodeProcess
IsDebuggerPresent
QueryPerformanceCounter
LoadResource
CompareStringA
MultiByteToWideChar
VirtualProtect
GetThreadLocale
DeleteFileA
DeleteFileW
GetWindowsDirectoryA
GetVersionExW
Sections
.text Size: 1024B - Virtual size: 780B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ