Static task
static1
Behavioral task
behavioral1
Sample
b4a6ec44c5c8148dc64a83ff002dbeb87e45a8414198afa74a39ab7cbc363575.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b4a6ec44c5c8148dc64a83ff002dbeb87e45a8414198afa74a39ab7cbc363575.exe
Resource
win10v2004-20220812-en
General
-
Target
b4a6ec44c5c8148dc64a83ff002dbeb87e45a8414198afa74a39ab7cbc363575
-
Size
83KB
-
MD5
08db4bb1396739ce0c02421057090cf5
-
SHA1
f389601cbfe132034b19322125589f3d121afc73
-
SHA256
b4a6ec44c5c8148dc64a83ff002dbeb87e45a8414198afa74a39ab7cbc363575
-
SHA512
a0bcae0935c425551de9a860e57b859d487be2cc298549f81ad4f2033ec62aa674a0ba508766526c79538fbe43a8b888a1214003f80e716901688955d8d36db2
-
SSDEEP
1536:j5kycORNoR55whXFvsgSbTmzexR8DB7oG9pPhjLu2NBMH05WO8ddsiD:j5kycORN4noNsVcQOsgpZHu2XMUE9dvD
Malware Config
Signatures
Files
-
b4a6ec44c5c8148dc64a83ff002dbeb87e45a8414198afa74a39ab7cbc363575.exe windows x86
876699cbe43193ca7d7cb6c9812e0bb4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetShortPathNameA
ExitProcess
GetCurrentProcess
GetCurrentThread
GetEnvironmentVariableA
GetModuleFileNameA
GetProcAddress
CreateProcessA
GlobalAlloc
GlobalFree
LoadLibraryA
SetPriorityClass
SetThreadPriority
VirtualAlloc
VirtualFree
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 454B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE