Static task
static1
Behavioral task
behavioral1
Sample
90d4d733898eb12e677b4a2c6de04866cfbbccd7ba0b2f773d5bf5cbb8a0f864.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
90d4d733898eb12e677b4a2c6de04866cfbbccd7ba0b2f773d5bf5cbb8a0f864.exe
Resource
win10v2004-20220812-en
General
-
Target
90d4d733898eb12e677b4a2c6de04866cfbbccd7ba0b2f773d5bf5cbb8a0f864
-
Size
66KB
-
MD5
871b1f609a74cda3b4cfdc638fc235e0
-
SHA1
86adfcdfd5025ef5b3342096f75a9cbde865bf51
-
SHA256
90d4d733898eb12e677b4a2c6de04866cfbbccd7ba0b2f773d5bf5cbb8a0f864
-
SHA512
e684b090033c37ec8ff05a1f6700c506acd3f37edd1bb25e51f15ef19443e1fd76423b43afb2c1406d1d3b39b6b70092b4b2fd92f127b0a048f880cdf19bbccd
-
SSDEEP
1536:FrXCaYyP55BrWbW5QhSdH3TX38l2/McLFYUCet:FrS/yPbsi5xTXMl2/M2YJet
Malware Config
Signatures
Files
-
90d4d733898eb12e677b4a2c6de04866cfbbccd7ba0b2f773d5bf5cbb8a0f864.exe windows x86
6a430b8abe3575ed19a83ff4be8c775c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenW
DeleteFileA
SetConsoleTitleA
GetModuleHandleA
VirtualAllocEx
GetModuleFileNameA
IsBadStringPtrW
GetProcessHeap
lstrcpyW
lstrcpyW
FindNextVolumeA
GetLocaleInfoA
GetNumberFormatA
SetLastError
GetStartupInfoW
FindFirstVolumeW
GetPrivateProfileIntA
lstrcpyW
lstrcpyW
lstrcpyW
GetStdHandle
SetCurrentDirectoryA
CreateEventA
untfs
Recover
ChkdskEx
Format
Extend
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.orpc Size: 1KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.RData Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Adata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE