Static task
static1
Behavioral task
behavioral1
Sample
92be09e4445d79282bbd3dc348e689e202f7de03573de18595308a159f3a44cc.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
92be09e4445d79282bbd3dc348e689e202f7de03573de18595308a159f3a44cc.exe
Resource
win10v2004-20220901-en
General
-
Target
92be09e4445d79282bbd3dc348e689e202f7de03573de18595308a159f3a44cc
-
Size
19KB
-
MD5
4e0403e132231752a102bb4d951681e0
-
SHA1
29206d3ead2801da70f577a34c5e49d7dcc8caf8
-
SHA256
92be09e4445d79282bbd3dc348e689e202f7de03573de18595308a159f3a44cc
-
SHA512
24e831a36c56b84c393fcd0c285f5664e9943e22e943956f3ccf9e7e6c5c4433851e02ceb0c54ae00d0697eb9366538b7e7a8c2bc2ee1dd7070be489c447c5e3
-
SSDEEP
384:ytA2iQr8F9stuSW6W4WvWcp6Wvsnu+jx6zxumWjv76tvFvWeGa:KAwestu2Wfp4uAx6zCjj6tvF0a
Malware Config
Signatures
Files
-
92be09e4445d79282bbd3dc348e689e202f7de03573de18595308a159f3a44cc.exe windows x86
7ce72da8f1739e6febc7251a933c82a1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadStringW
ntdll
RtlOemStringToUnicodeString
wcschr
RtlInitUnicodeString
RtlUnicodeStringToOemString
RtlInitString
msvcrt
__p__fmode
__set_app_type
__p__commode
_controlfp
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__initenv
exit
_cexit
_XcptFilter
_exit
_c_exit
_except_handler3
kernel32
WriteFile
GetModuleHandleA
GetConsoleOutputCP
GetSystemDefaultLangID
SetThreadLocale
GetFileAttributesW
SetCurrentDirectoryW
GetCurrentDirectoryW
GetEnvironmentVariableW
SearchPathW
CreateProcessW
WaitForSingleObject
GetExitCodeProcess
CloseHandle
GetStdHandle
ExitProcess
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE