Static task
static1
Behavioral task
behavioral1
Sample
76d542b8a4efa7bd014a7e23a7340a89d08367375c35d40e13c347926f90b065.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
76d542b8a4efa7bd014a7e23a7340a89d08367375c35d40e13c347926f90b065.exe
Resource
win10v2004-20220812-en
General
-
Target
76d542b8a4efa7bd014a7e23a7340a89d08367375c35d40e13c347926f90b065
-
Size
93KB
-
MD5
080e9578319a6f335dc10ea929120c90
-
SHA1
834f191c0e2c3c864dd4f110dc6469ef52bd9108
-
SHA256
76d542b8a4efa7bd014a7e23a7340a89d08367375c35d40e13c347926f90b065
-
SHA512
77d2a03bf1e534e351c7a8a0b48efc1ed0b4ae8345d4d3f92be6eb1d988edf8ca1909b6d63ebf19d695c872f8a87362fff9ff5f36d95888e64c447ce547501cb
-
SSDEEP
1536:eB2LuhV0FoYIjFxdq+bsTVIuDMYn40eHjBDwcRE+1lpdu4mZpvZf9icW70U:q2LuhVmQjzdq0sR5McXeFV1L4TR9i3
Malware Config
Signatures
Files
-
76d542b8a4efa7bd014a7e23a7340a89d08367375c35d40e13c347926f90b065.exe windows x86
c8a3d61f10f3964e47fc3491bd570af0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
LoadLibraryA
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
GetProcAddress
FreeLibrary
GetCurrentProcessId
lstrcpyA
GetStartupInfoA
msvcrt
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
__getmainargs
_cexit
_XcptFilter
_exit
_c_exit
_controlfp
exit
_acmdln
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
user32
wsprintfA
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 68B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
�V�YA$ Size: 82KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE