Static task
static1
Behavioral task
behavioral1
Sample
acff3e4610a703b7c41d66ec1c40c3c18b76991aeeb10aa579fe1394f6d9e595.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
acff3e4610a703b7c41d66ec1c40c3c18b76991aeeb10aa579fe1394f6d9e595.exe
Resource
win10v2004-20220812-en
General
-
Target
acff3e4610a703b7c41d66ec1c40c3c18b76991aeeb10aa579fe1394f6d9e595
-
Size
63KB
-
MD5
d10128d6895a845effabaede8f97ea25
-
SHA1
8b1e20ce642b0dd79cd4455dc056046a61cf5b25
-
SHA256
acff3e4610a703b7c41d66ec1c40c3c18b76991aeeb10aa579fe1394f6d9e595
-
SHA512
32f71f5f059abe35af31d05bee714feca2a7b5015e875d5977a703fc3700b9d80dcc32c826197d4b196ee3ce7a9cbd7c50b73ad62554aa5b7557e4fab59e69c5
-
SSDEEP
1536:MdVujdjfpx3ptWxEWO8KbT/XE2J1artGnEXEwdF78EM:MDsNfD5oiewceartGEXEwdB83
Malware Config
Signatures
Files
-
acff3e4610a703b7c41d66ec1c40c3c18b76991aeeb10aa579fe1394f6d9e595.exe windows x86
e77e3c8453bb2f78bd4e66052b54793c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateTimerQueue
GetPrivateProfileSectionW
SignalObjectAndWait
GetProcessPriorityBoost
DeleteTimerQueueTimer
GetModuleHandleA
lstrcpynA
OpenEventA
FindNextVolumeMountPointA
IsBadHugeReadPtr
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 49KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE