Static task
static1
Behavioral task
behavioral1
Sample
d90d0004044532cc0ec0296e552f916f480c487ad300366742fc3d3351fba701.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d90d0004044532cc0ec0296e552f916f480c487ad300366742fc3d3351fba701.exe
Resource
win10v2004-20220901-en
General
-
Target
d90d0004044532cc0ec0296e552f916f480c487ad300366742fc3d3351fba701
-
Size
67KB
-
MD5
a954c0ef1df69b104c289b4a72fcc5ff
-
SHA1
7eba7ad9dd7835e3c85460d813d043f8dc5374fe
-
SHA256
d90d0004044532cc0ec0296e552f916f480c487ad300366742fc3d3351fba701
-
SHA512
c3e693025d3c75aa0d5fc8553b82812bb76d5a328e5620dab301f66e776808094819d440548064ef2d3c08fea4abd486b081f83ef48aa250c0b89ecac6e55ba1
-
SSDEEP
1536:WW2U0CSACq+KIdAXTD6TJBQczulQu+ptdHUT7aTJQyY6SJcO1EpIF5KEbKK:WWd0CSN6DDOeczWQFbdHekLYbcmtGK
Malware Config
Signatures
Files
-
d90d0004044532cc0ec0296e552f916f480c487ad300366742fc3d3351fba701.exe windows x86
4e915e85072b0778f654c8c9a4c56d60
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExpungeConsoleCommandHistoryA
SetConsoleActiveScreenBuffer
QueryDosDeviceW
GlobalUnfix
DeleteFiber
FindNextVolumeW
DeleteFiber
ChangeTimerQueueTimer
GetVersionExW
PulseEvent
GetTapePosition
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 52KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE