Static task
static1
Behavioral task
behavioral1
Sample
875610dad0e56435638515f9f41091dfe9062e03981a9c74f012e10ab4a6d8ad.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
875610dad0e56435638515f9f41091dfe9062e03981a9c74f012e10ab4a6d8ad.exe
Resource
win10v2004-20220812-en
General
-
Target
875610dad0e56435638515f9f41091dfe9062e03981a9c74f012e10ab4a6d8ad
-
Size
24KB
-
MD5
a3f737a0a14e0905cafcf83481198c2d
-
SHA1
6a1b519010d1ad1fed17a2da93610c58b97adbf1
-
SHA256
875610dad0e56435638515f9f41091dfe9062e03981a9c74f012e10ab4a6d8ad
-
SHA512
6a7525586906844e403a2dad404a700e6b90a7b75161c999f5b67cb991a06e3d22531333d02e83a1c801af91b7141fbd76ef558cc3cf40330e53f26c064c3f2a
-
SSDEEP
768:9i0BLa6qoY8TIyWmU8KRC80kQMb0Ts2p7:9iyLkHAWmU8sQLTs2p7
Malware Config
Signatures
Files
-
875610dad0e56435638515f9f41091dfe9062e03981a9c74f012e10ab4a6d8ad.exe windows x86
ca023b0976fe29c9f183c650d8ae30a6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoA
LocalAlloc
FormatMessageA
SetEnvironmentVariableA
GetLocaleInfoW
GetCurrentProcessId
FreeEnvironmentStringsA
GetOEMCP
ReadFile
PulseEvent
GetProcessHeap
TlsFree
GetSystemDirectoryA
SetPriorityClass
FindFirstFileA
FileTimeToSystemTime
ResumeThread
GetFileType
GlobalUnlock
InterlockedIncrement
GetStdHandle
SetLastError
CreateFileMappingA
GlobalMemoryStatus
FileTimeToLocalFileTime
LocalFree
GetEnvironmentStringsW
ExitThread
msvcrt
wcschr
_beginthread
__getmainargs
_strnicmp
_snwprintf
Sections
.text Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ