Static task
static1
Behavioral task
behavioral1
Sample
ad1fb0c142a414355d0217f8da9bf61587033679c75da6dacb19c1ce396dc718.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ad1fb0c142a414355d0217f8da9bf61587033679c75da6dacb19c1ce396dc718.exe
Resource
win10v2004-20220812-en
General
-
Target
ad1fb0c142a414355d0217f8da9bf61587033679c75da6dacb19c1ce396dc718
-
Size
244KB
-
MD5
791aaa2ea7777a2b56cee95f7e555789
-
SHA1
db6c34cf50988e3f6a367e9e15878b0f5c5f0021
-
SHA256
ad1fb0c142a414355d0217f8da9bf61587033679c75da6dacb19c1ce396dc718
-
SHA512
8b366f417e6eb4031389578cd532335ab02aec350df2882132d9eef544489387680be22b47895fd06d6f6a81899b63552a1dfc7a888a5fbce273b2bfc74efdae
-
SSDEEP
6144:pLIwbTrkF67K1+XSVtmfyWVCuITc/3yU+BgNUsdQM3StV1X:WwPr867KVSfFVCusa+YUsdBS3J
Malware Config
Signatures
Files
-
ad1fb0c142a414355d0217f8da9bf61587033679c75da6dacb19c1ce396dc718.exe windows x86
5c823d9b88158dda8a2d9b0032e183ad
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryA
DeleteFileA
ExitProcess
FindFirstFileA
FindResourceA
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetFileAttributesA
GetFileAttributesExA
GetModuleHandleA
GetProcessHeap
GetSystemTime
GetTempPathA
GlobalFree
GlobalSize
HeapAlloc
HeapSize
LoadResource
LocalAlloc
LocalFree
LockResource
MoveFileExA
SetCurrentDirectoryA
SetEvent
SetFilePointer
UnlockFileEx
VirtualAlloc
VirtualFree
VirtualQuery
WriteFile
lstrcmpiA
lstrlenA
user32
MessageBoxA
Sections
.text Size: 241KB - Virtual size: 241KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 704B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ