Static task
static1
Behavioral task
behavioral1
Sample
775d70662b7c74422617d3d6ec8c8c130ed82a0f0b723357b6b1c8a77250f29e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
775d70662b7c74422617d3d6ec8c8c130ed82a0f0b723357b6b1c8a77250f29e.exe
Resource
win10v2004-20220812-en
General
-
Target
775d70662b7c74422617d3d6ec8c8c130ed82a0f0b723357b6b1c8a77250f29e
-
Size
77KB
-
MD5
6e6db04ec35163bde3413891d92ad86e
-
SHA1
33664a732f9979b4e94eac5590b7e784b6d9d3ee
-
SHA256
775d70662b7c74422617d3d6ec8c8c130ed82a0f0b723357b6b1c8a77250f29e
-
SHA512
58eee570a927a81e0c05a4ddef173d68a05f39f723462a5ee5a47be6d523b925ba9f9108593d50e2656b9b7b096ea8cb75830cd48fa72d12fda24c0d9f7a2fe5
-
SSDEEP
1536:zkS5GPtjR59Lt+6yCfzj0/DXanWguXKw2d9EilbOH2nVeg0:zkDPr5pgTCsDXSTLrtOHa0b
Malware Config
Signatures
Files
-
775d70662b7c74422617d3d6ec8c8c130ed82a0f0b723357b6b1c8a77250f29e.exe windows x86
ed2a6db34d9b388e00ad00bc8436b2ca
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
DeleteFileW
GetTempPathW
InterlockedCompareExchange
EnumCalendarInfoA
GetConsoleMode
GlobalHandle
GetStdHandle
GetCommandLineA
VirtualProtect
GetCurrentProcessId
GetStartupInfoA
GetCommandLineW
GetProcAddress
CreateProcessW
SizeofResource
GetExitCodeProcess
GetWindowsDirectoryA
GetCurrentThread
IsBadWritePtr
GetModuleHandleA
MulDiv
GetOEMCP
GlobalReAlloc
GetLocaleInfoW
DeleteFileA
SetFilePointer
GetThreadLocale
CreateDirectoryA
LoadResource
GlobalFree
SetFileAttributesA
GetTempPathA
RtlMoveMemory
msvcrt
__getmainargs
_except_handler3
_controlfp
__p__fmode
__p___initenv
_initterm
_adjust_fdiv
_XcptFilter
_exit
__p__commode
__set_app_type
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ