Static task
static1
Behavioral task
behavioral1
Sample
3f727d401f3387dd1528532e9fe58230cb5d36a3477028a5ce9594d8cef54b76.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3f727d401f3387dd1528532e9fe58230cb5d36a3477028a5ce9594d8cef54b76.exe
Resource
win10v2004-20220901-en
General
-
Target
3f727d401f3387dd1528532e9fe58230cb5d36a3477028a5ce9594d8cef54b76
-
Size
66KB
-
MD5
a36d3a24f8a1584c270d33cdf848b427
-
SHA1
5040d7b7d8a6b6314d278bd180201fc414df25aa
-
SHA256
3f727d401f3387dd1528532e9fe58230cb5d36a3477028a5ce9594d8cef54b76
-
SHA512
c98232af47082658971c19f92524e494e33aa49e4e90c170948b38fe853a04482a3292f245bc5262827524259085fd2b377d5091983d28ccdc9d81a294ed65e2
-
SSDEEP
1536:Fp60Z4rwyZUNf5sXKldVNLLXdqHdUXe57/LPK6:D6o4rwy+hd7LNHe57/G
Malware Config
Signatures
Files
-
3f727d401f3387dd1528532e9fe58230cb5d36a3477028a5ce9594d8cef54b76.exe windows x86
19cb2e566d64e4e21c0e40e8f463e2c1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAlloc
PrivMoveFileIdentityW
GetOEMCP
GetTempPathW
lstrcpynA
GetCommandLineA
WriteProcessMemory
EnumResourceNamesA
BackupSeek
GetProcessShutdownParameters
DeviceIoControl
VirtualAllocEx
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE