Static task
static1
Behavioral task
behavioral1
Sample
443bd4f763908bbf35ddd05382125b1a1ab34dcf9e62659be3916b98f6216bd5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
443bd4f763908bbf35ddd05382125b1a1ab34dcf9e62659be3916b98f6216bd5.exe
Resource
win10v2004-20220812-en
General
-
Target
443bd4f763908bbf35ddd05382125b1a1ab34dcf9e62659be3916b98f6216bd5
-
Size
76KB
-
MD5
0f8fcf454b3753be478ce500fa4cab02
-
SHA1
faa7837d5eefbf337a91ef38175e802c7390d950
-
SHA256
443bd4f763908bbf35ddd05382125b1a1ab34dcf9e62659be3916b98f6216bd5
-
SHA512
55acd57a51a3cc29173850a1843f4897f30d78bcc9669b9763838f603177ea0798dc81fb1fe70375bb47579efeb5710b9db386305f62d26d7cd90d72459ed713
-
SSDEEP
1536:Ol/Fm79X0t8ob4ABKqd+TEmtk0IwJDkdz8NpjVrs2ryrd1vUQuq6:atmJYb4e1ddmtk0LJ9NHs2qo
Malware Config
Signatures
Files
-
443bd4f763908bbf35ddd05382125b1a1ab34dcf9e62659be3916b98f6216bd5.exe windows x86
fc6b6623baa6d67a2be07c95c4c09361
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FillConsoleOutputCharacterA
ReplaceFileA
FreeLibraryAndExitThread
FindActCtxSectionStringW
SetVolumeLabelA
SetProcessWorkingSetSize
CreateNamedPipeW
QueryActCtxW
GetSystemTimeAdjustment
IsBadHugeWritePtr
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.brdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE