Static task
static1
Behavioral task
behavioral1
Sample
437cdd9f08f4b710a555596ed301cff5847177f410de453c3d2e42aebf2539db.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
437cdd9f08f4b710a555596ed301cff5847177f410de453c3d2e42aebf2539db.exe
Resource
win10v2004-20220812-en
General
-
Target
437cdd9f08f4b710a555596ed301cff5847177f410de453c3d2e42aebf2539db
-
Size
116KB
-
MD5
523913555fd1d07a660ee9e1c509ed30
-
SHA1
2fb88c11caf18967a276ec68ec1b7c1eff33fbc1
-
SHA256
437cdd9f08f4b710a555596ed301cff5847177f410de453c3d2e42aebf2539db
-
SHA512
208e879db732a8c8640a416e5230c0aa6a2b459e6cbb75b54f71bd7e4b2e3bd8379f10cac55ae8dad1a3dcbde34f9baebefdd6b84e5228963ff978e088e71841
-
SSDEEP
3072:97XPf/TpWkL1qbXZRTIF+010ZFGtTiboKuL+L9w:hPf/TpW+qj7TIuNoKcg
Malware Config
Signatures
Files
-
437cdd9f08f4b710a555596ed301cff5847177f410de453c3d2e42aebf2539db.exe windows x86
624b04b2eab3e39453b9359c793e0df1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDiskFreeSpaceA
SetProcessAffinityMask
CreatePipe
SetPriorityClass
FlushViewOfFile
SetFileAttributesA
GetOverlappedResult
SetTimeZoneInformation
UnmapViewOfFile
FreeResource
lstrcatW
CreateDirectoryW
ExpandEnvironmentStringsW
GetVersionExW
FatalAppExitW
CloseHandle
RemoveDirectoryA
TlsSetValue
CreateDirectoryExW
CallNamedPipeW
RtlUnwind
MoveFileExW
GlobalHandle
CreateSemaphoreA
GetComputerNameExW
OutputDebugStringW
FindFirstFileA
Process32FirstW
CreateFileA
user32
EnumPropsExW
InsertMenuW
GetDlgItemTextA
GetMenuCheckMarkDimensions
CheckRadioButton
DestroyIcon
winspool.drv
WaitForPrinterChange
Sections
.text Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ