Static task
static1
Behavioral task
behavioral1
Sample
a76e0f97230ba5577efc8989bac5b377753187a5012cf8b62ec3eb6b345a4071.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a76e0f97230ba5577efc8989bac5b377753187a5012cf8b62ec3eb6b345a4071.exe
Resource
win10v2004-20221111-en
General
-
Target
a76e0f97230ba5577efc8989bac5b377753187a5012cf8b62ec3eb6b345a4071
-
Size
56KB
-
MD5
e167681d5a8e7db79674ba7fb75da9b4
-
SHA1
fd03829b3ee864337e07904c20f66dd8502aaa8d
-
SHA256
a76e0f97230ba5577efc8989bac5b377753187a5012cf8b62ec3eb6b345a4071
-
SHA512
12bfc2028f546b315679918ac4e1a6b0c059353c055f1b03dc3c12fdea153b903c895ea28a4b9db0f6a2695e63d93b24fa7228a856816c7c0253f6c4b3f2062a
-
SSDEEP
1536:hdM+VQUfBBN/g/IUEnV5+90gcehlRlKR5TXTe/BU:hv5jKC53gcehlOTXT2W
Malware Config
Signatures
Files
-
a76e0f97230ba5577efc8989bac5b377753187a5012cf8b62ec3eb6b345a4071.exe windows x86
632492cc54e862dd5ff1971106a38e32
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryExA
WritePrivateProfileStructA
SetThreadUILanguage
GetStartupInfoW
PeekNamedPipe
OpenSemaphoreA
GetSystemDefaultUILanguage
FindFirstFileExW
AssignProcessToJobObject
DeleteTimerQueue
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE