Static task
static1
Behavioral task
behavioral1
Sample
82bbbc6d06137bf52ce19bbf344d40b10d86e098e855869b79a6591b7aecd7de.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
82bbbc6d06137bf52ce19bbf344d40b10d86e098e855869b79a6591b7aecd7de.exe
Resource
win10v2004-20220901-en
General
-
Target
82bbbc6d06137bf52ce19bbf344d40b10d86e098e855869b79a6591b7aecd7de
-
Size
143KB
-
MD5
a4e880e5cf8b074346b1d0e2630ea6fb
-
SHA1
fba7f72bb02cbdde65b95393b5f84dedc5d0be53
-
SHA256
82bbbc6d06137bf52ce19bbf344d40b10d86e098e855869b79a6591b7aecd7de
-
SHA512
0d714a0670d5a5f36c152dd0bc48bbc2ad5838234f91e7b725dd18c67a213f9c76ff937c8144dffe32a69fd360957d5325b7a76d9cfb1ae028d75e98cbfe8991
-
SSDEEP
3072:BvSdU9zpVsZ3r+DQepQYgt/pXp3pbtO7HQyRNQCeBcauja8beFSE:ZS2lpVw3r+csQYgZpfbt0rVIcdjNeFt
Malware Config
Signatures
Files
-
82bbbc6d06137bf52ce19bbf344d40b10d86e098e855869b79a6591b7aecd7de.exe windows x86
3709f4e67da84c824f5a84036b744c79
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
ZwUnmapViewOfSection
NtQueryInformationProcess
ZwCreateThread
memcpy
memset
RtlUnwind
kernel32
SizeofResource
WriteProcessMemory
GetModuleFileNameA
LockResource
VirtualAllocEx
FindResourceA
SetThreadContext
LoadResource
GetCurrentThread
VirtualFree
VirtualAlloc
ReadProcessMemory
CreateProcessA
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 606B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 139KB - Virtual size: 139KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ