Static task
static1
Behavioral task
behavioral1
Sample
7722fc694446bd220987fe0f10936987cfeee38a5d5f4ac08257708311ca51e2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7722fc694446bd220987fe0f10936987cfeee38a5d5f4ac08257708311ca51e2.exe
Resource
win10v2004-20220901-en
General
-
Target
7722fc694446bd220987fe0f10936987cfeee38a5d5f4ac08257708311ca51e2
-
Size
75KB
-
MD5
5eb84afac77de266a99624a787e4a0bb
-
SHA1
b5cfad37314caa9bdd1e2bbe8c22a8e4871651a2
-
SHA256
7722fc694446bd220987fe0f10936987cfeee38a5d5f4ac08257708311ca51e2
-
SHA512
d7e7c75385b218405aa3ef5d95ee1309a9aa5448e921a8fb2c80df1f835c9225e34c950e8eebb7df88aa9672be8109d32d31d7295239ca12f08b6ab208693261
-
SSDEEP
1536:jj8d0cHjiifOBqvUlEhHJCaSKhQR5yJBV3L+lfDTw:jj8d0miifO+hHJCxSAgBkw
Malware Config
Signatures
Files
-
7722fc694446bd220987fe0f10936987cfeee38a5d5f4ac08257708311ca51e2.exe windows x86
8d1f3607f6f644aa45436b6badedcfb7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CreateProcessA
ExitProcess
FreeLibrary
GetCommandLineA
GetCurrentProcess
GetModuleFileNameA
GetProcAddress
GetProcessHeap
HeapAlloc
HeapFree
IsBadReadPtr
LoadLibraryA
VirtualAllocEx
VirtualFree
VirtualProtect
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 20B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 492B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE