Static task
static1
Behavioral task
behavioral1
Sample
35feca9e071bb3f7ada5d6ec0b28e1905548a82baa5c07e7bc09f66a0e5056f6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
35feca9e071bb3f7ada5d6ec0b28e1905548a82baa5c07e7bc09f66a0e5056f6.exe
Resource
win10v2004-20220901-en
General
-
Target
35feca9e071bb3f7ada5d6ec0b28e1905548a82baa5c07e7bc09f66a0e5056f6
-
Size
39KB
-
MD5
018cb8a80fb37b5bc93577be1a4537f2
-
SHA1
d5aab02162b7a72cb987b7a34629e55ef87d089f
-
SHA256
35feca9e071bb3f7ada5d6ec0b28e1905548a82baa5c07e7bc09f66a0e5056f6
-
SHA512
9be12b7d824afb818de127cd39f31a008880e43b9d80e759a766dca71e3fa46e78763addf7568570671bdb313a0f247e1aa6887ce70c06dab0853f327d112d2e
-
SSDEEP
768:xBlcizDsGdBevq38/LwsvhV9cZXBSCkik7nU9B:xH/zBdsvqssWLinSOk7ne
Malware Config
Signatures
Files
-
35feca9e071bb3f7ada5d6ec0b28e1905548a82baa5c07e7bc09f66a0e5056f6.exe windows x86
0a23b5ecaeaf09504f83f12245164fc2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoA
LCMapStringA
SetPriorityClass
GetVersion
GetDateFormatA
GlobalAlloc
GetModuleHandleA
GetConsoleCP
GetStringTypeW
GetCurrentThread
GetProcessAffinityMask
SetThreadAffinityMask
lstrlenA
SetLastError
QueryPerformanceFrequency
GetSystemDirectoryA
Module32Next
FindFirstFileA
GetFileType
msvcrt
exit
localtime
_atodbl
system
_open
_initterm
_getdiskfree
rename
_vscprintf
_lrotr
wcsftime
_stat
__p__fmode
_adjust_fdiv
__setusermatherr
_controlfp
_ismbcgraph
getwc
_locking
_stricmp
_makepath
_exit
__getmainargs
_acmdln
_except_handler3
_mbsnbicoll
__p__commode
memcpy
__set_app_type
_XcptFilter
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ