Static task
static1
Behavioral task
behavioral1
Sample
a30ac38e021bf75f38682f72ce242b844a152427652f9c8f8225618ec22ec99c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a30ac38e021bf75f38682f72ce242b844a152427652f9c8f8225618ec22ec99c.exe
Resource
win10v2004-20221111-en
General
-
Target
a30ac38e021bf75f38682f72ce242b844a152427652f9c8f8225618ec22ec99c
-
Size
77KB
-
MD5
979697a3c0d2fdbba18b9214dc937448
-
SHA1
79633497c8b1329ff525b144993450d056e44db0
-
SHA256
a30ac38e021bf75f38682f72ce242b844a152427652f9c8f8225618ec22ec99c
-
SHA512
a6f356ad93f2f9823e171d42b416c8c7956d4e64a2b157451c99983d3c2dd25f95a733c61ad967e0b50b9dcf557b355b5fd03c0d4ffe1464a900040806dd28eb
-
SSDEEP
1536:SwIxWiCBnCc5DBrV244+88J1mMcG4ncMCG6mt1ytd1FzPz9:NOWiCB7rlznrm/vcM5pLYjz9
Malware Config
Signatures
Files
-
a30ac38e021bf75f38682f72ce242b844a152427652f9c8f8225618ec22ec99c.exe windows x86
0b1ee19b8ecae0757b13d452d72dc8d9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThread
GetTempFileNameA
GetProcAddress
GetSystemDirectoryA
GlobalAlloc
FileTimeToLocalFileTime
MulDiv
lstrcmpA
GetStartupInfoA
LocalFree
GetModuleHandleA
SizeofResource
GetStartupInfoW
RtlMoveMemory
DeleteFileA
FormatMessageA
OpenProcess
GetFileAttributesA
GetExitCodeProcess
DeviceIoControl
GetThreadLocale
GetTempPathA
GlobalFree
VirtualProtect
GetSystemTimeAsFileTime
LoadResource
GetModuleFileNameA
IsBadReadPtr
SetUnhandledExceptionFilter
msvcrt
__getmainargs
_initterm
_controlfp
__set_app_type
__p__fmode
_exit
__p__commode
_except_handler3
_adjust_fdiv
__p___initenv
_XcptFilter
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ