Static task
static1
Behavioral task
behavioral1
Sample
9e13cf2b524523dd177d6bcc24274f7ef17a5c237e61f5aa5b5b9159f7f57c36.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9e13cf2b524523dd177d6bcc24274f7ef17a5c237e61f5aa5b5b9159f7f57c36.exe
Resource
win10v2004-20220812-en
General
-
Target
9e13cf2b524523dd177d6bcc24274f7ef17a5c237e61f5aa5b5b9159f7f57c36
-
Size
160KB
-
MD5
9b42f272bff301749e59b12327bdf796
-
SHA1
05595fa0501fc597f7cefb7e5e238f1b962229ff
-
SHA256
9e13cf2b524523dd177d6bcc24274f7ef17a5c237e61f5aa5b5b9159f7f57c36
-
SHA512
709558e6b8061ca20147f70574e41424630d326f099804937e4f250ea8643aa2089d4598b69b69e9d0a05d178321dde9c9fef242e714d77d44e27560dbd3f5cf
-
SSDEEP
1536:xt1qTRkBICxrCSyEDTcBMwQglG9u2m/5oMqi+RasG8iQOdTjBsROBya66:8+NFWMwQ/uvBjqxasGWOdX3B+6
Malware Config
Signatures
Files
-
9e13cf2b524523dd177d6bcc24274f7ef17a5c237e61f5aa5b5b9159f7f57c36.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_SYSTEM
Sections
.data Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gdata Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 4KB - Virtual size: 54B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text0 Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 320B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ