Static task
static1
Behavioral task
behavioral1
Sample
21b28f8fbfba449a21057716cb42eeabb5f1326791977cb087d4b0274095fd75.exe
Resource
win7-20221111-en
General
-
Target
21b28f8fbfba449a21057716cb42eeabb5f1326791977cb087d4b0274095fd75
-
Size
192KB
-
MD5
52b925c507b96dded0725eb164fc6b1e
-
SHA1
113d95075af752fb07456e2b001157b87c576bb1
-
SHA256
21b28f8fbfba449a21057716cb42eeabb5f1326791977cb087d4b0274095fd75
-
SHA512
f8c9af9ce6ac2c82a4f943a23c584e62cd4ffc422c83507aae23bc36badd28d103a3edaffca18cac43d10d184b945c59110b2c9bd11a032f6a75abb0e8f7b2a2
-
SSDEEP
3072:F8B9tMfP9ZGFwgvRLLCzOYFDq+UdnIPPlMzcsofIw+KaX0LcHLkMIIRj:F6M96wgvRHCzOYtqlGyzcsX3KA0LQIQx
Malware Config
Signatures
Files
-
21b28f8fbfba449a21057716cb42eeabb5f1326791977cb087d4b0274095fd75.exe windows x86
ef39d474ee88b9215814d74ee695b02b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
GetProcessHeap
VirtualAlloc
VirtualProtect
VirtualFree
GetProcAddress
LoadLibraryA
IsBadReadPtr
HeapFree
FreeLibrary
HeapReAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
RtlUnwind
WriteFile
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 160KB - Virtual size: 161KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ