Static task
static1
Behavioral task
behavioral1
Sample
d7f8d405dd74b36442ee17a2b265c8fbf9d59270b0a0057535429c2eedbca0cb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d7f8d405dd74b36442ee17a2b265c8fbf9d59270b0a0057535429c2eedbca0cb.exe
Resource
win10v2004-20220812-en
General
-
Target
d7f8d405dd74b36442ee17a2b265c8fbf9d59270b0a0057535429c2eedbca0cb
-
Size
1.8MB
-
MD5
778c545e46aed5560c07665578755e61
-
SHA1
aa8f20fe5dd595f75c81ba59496aa7194235dac5
-
SHA256
d7f8d405dd74b36442ee17a2b265c8fbf9d59270b0a0057535429c2eedbca0cb
-
SHA512
0492263af32f34b86b88254f321114aa7701e795704ec49721059509604ec558cd74b57abec03f6b7462880547d3ff3ef51237e485efd8204041edbc2f44e0f3
-
SSDEEP
24576:R8bLC1jIchGfKckdr5dcopr9TdwsTV1vwLHYjVS:6+1j3ckTdcQZdwA1vwL4jVS
Malware Config
Signatures
Files
-
d7f8d405dd74b36442ee17a2b265c8fbf9d59270b0a0057535429c2eedbca0cb.exe windows x86
e774bc3ae52c42b4036784b8d8368a46
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
SetEvent
SetCurrentDirectoryW
GetSystemDirectoryW
SetLastError
ExpandEnvironmentStringsW
GetStartupInfoW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
FindFirstFileW
FindClose
GetLocalTime
CreateThread
DeviceIoControl
SetErrorMode
GetVolumeInformationW
GetDiskFreeSpaceW
GetCommandLineW
GetDriveTypeW
SetVolumeLabelW
GetEnvironmentVariableW
Sleep
CloseHandle
SetStdHandle
SetConsoleCtrlHandler
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
SetFilePointer
GetLastError
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
LCMapStringW
LCMapStringA
MultiByteToWideChar
WriteFile
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
lstrcpyA
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetModuleFileNameA
GetModuleHandleA
GetVersion
GetCommandLineA
RtlUnwind
GetDriveTypeA
GetFullPathNameA
GetCurrentDirectoryA
GetCurrentProcess
ExitThread
msvcrt
memset
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 880B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ