Static task
static1
Behavioral task
behavioral1
Sample
7507a347224e10c7a6b2bbea8f340c1b0b8045dc47ebef6fa544ad3171380669.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7507a347224e10c7a6b2bbea8f340c1b0b8045dc47ebef6fa544ad3171380669.exe
Resource
win10v2004-20220812-en
General
-
Target
7507a347224e10c7a6b2bbea8f340c1b0b8045dc47ebef6fa544ad3171380669
-
Size
71KB
-
MD5
98c8e92fc61f479a8e758bd469e764f7
-
SHA1
232774fee188c400533dfd811438e6560fc26021
-
SHA256
7507a347224e10c7a6b2bbea8f340c1b0b8045dc47ebef6fa544ad3171380669
-
SHA512
c3fc1b82cba8aa6fce9dc766c05857495665a0ed1d942e4d95337d49a718d3955b33fca905ddf8b86b01026cda05c91e0690f0a37a7791ad7a91f7bf9ae588ec
-
SSDEEP
1536:8u290BpbCkFGAE1HvA45gfNWdmxq2CMaDJm:X290BpbNFGpHvA4ckdmxq3c
Malware Config
Signatures
Files
-
7507a347224e10c7a6b2bbea8f340c1b0b8045dc47ebef6fa544ad3171380669.exe windows x86
b038ad5054370851147af7b6ae198992
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalHandle
EnumSystemCodePagesA
ReadFileScatter
GetCurrentConsoleFont
ExpandEnvironmentStringsW
WriteProcessMemory
GetProcessHeaps
ZombifyActCtx
GetExpandedNameA
HeapCompact
PrivMoveFileIdentityW
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 57KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE