Static task
static1
Behavioral task
behavioral1
Sample
8b393a950c47ee05402d62c9774dfe18a6dfd54dc51cdfe17c2924448d1c1f9c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8b393a950c47ee05402d62c9774dfe18a6dfd54dc51cdfe17c2924448d1c1f9c.exe
Resource
win10v2004-20220901-en
General
-
Target
8b393a950c47ee05402d62c9774dfe18a6dfd54dc51cdfe17c2924448d1c1f9c
-
Size
61KB
-
MD5
af52ad0376dbc459e0eed4ed6127b8cb
-
SHA1
e41c3f8e010f08b3d6196b61045ef5bdf5b437cf
-
SHA256
8b393a950c47ee05402d62c9774dfe18a6dfd54dc51cdfe17c2924448d1c1f9c
-
SHA512
a7bda5592bab2002f0706eca39deba1f4a7988eea6496af33582bc72ab0b0de1851352f1821f832afbb08b8dfd40439d7a29494d4e454af9ce4d7e4f2867ed5f
-
SSDEEP
1536:bw55aqy+Bw7mSBtRECPQBu7y7tVhFZFBmfVa00isq+jGSJb+UfMKJVoSg:bwxi7tR/PQUIzBm5sq+jGSJfC
Malware Config
Signatures
Files
-
8b393a950c47ee05402d62c9774dfe18a6dfd54dc51cdfe17c2924448d1c1f9c.exe windows x86
0e73fc245835f5286f6b2ce7c08d1ae1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExtendVirtualBuffer
OpenFile
CreateProcessInternalA
CompareFileTime
IsValidLocale
SetConsoleTitleA
Toolhelp32ReadProcessMemory
GetConsoleProcessList
EnumDateFormatsA
CreateDirectoryA
QueryPerformanceFrequency
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 47KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE