Static task
static1
Behavioral task
behavioral1
Sample
7a8979d7529aff95bc92828b7e005192c451f764c831c2819891d18af966bda0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7a8979d7529aff95bc92828b7e005192c451f764c831c2819891d18af966bda0.exe
Resource
win10v2004-20220812-en
General
-
Target
7a8979d7529aff95bc92828b7e005192c451f764c831c2819891d18af966bda0
-
Size
29KB
-
MD5
0816fbe3f9db95d1d5d17c847ad7de7f
-
SHA1
11860a60879b14b8b08193f52ff9bbe5cd9cbdd2
-
SHA256
7a8979d7529aff95bc92828b7e005192c451f764c831c2819891d18af966bda0
-
SHA512
9ed81069776a877bd70aedb51deb2c0bf87810105aa63164defb99d69ba8ae52612d83c1f0edeec1bc349f4fda649dd07ddcbddb3cc610d7edb59aeccb8b2976
-
SSDEEP
768:bncSv1fYN9bjyoPg3lspxTjWtL8LIazF9:ASve9bjm1spJWV6IE9
Malware Config
Signatures
Files
-
7a8979d7529aff95bc92828b7e005192c451f764c831c2819891d18af966bda0.exe windows x86
a9f544e558731907efd89d1e721e5e41
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
ExitProcess
FindResourceA
GetModuleFileNameA
GetModuleHandleA
GetThreadContext
LoadResource
LockResource
OutputDebugStringA
ResumeThread
RtlZeroMemory
SetThreadContext
SizeofResource
VirtualAllocEx
WriteProcessMemory
lstrlenA
ntdll
ZwUnmapViewOfSection
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vrcvr0 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 528B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ