Static task
static1
Behavioral task
behavioral1
Sample
a75a8466ac4a4abeb9a613de95a72d2f10827d16cfb3f055a109f5aa5140fc75.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a75a8466ac4a4abeb9a613de95a72d2f10827d16cfb3f055a109f5aa5140fc75.exe
Resource
win10v2004-20221111-en
General
-
Target
a75a8466ac4a4abeb9a613de95a72d2f10827d16cfb3f055a109f5aa5140fc75
-
Size
274KB
-
MD5
bfe829d757618f4c44fbb80303cfdc8f
-
SHA1
61526a4edf3f0a474e72e74e98461849a13d9fb1
-
SHA256
a75a8466ac4a4abeb9a613de95a72d2f10827d16cfb3f055a109f5aa5140fc75
-
SHA512
4afa5b89f1ff6a72271a9a091d725cb402d58e626f68bf12d84ed2023f2a5ff2857af94f97d7a7a724edff032584b49e1b8202032dbc1ca98b81834e6021f7e0
-
SSDEEP
6144:p6eqHRfE63NBpKkJnyXBKdVnJrufumG89LZuZ3t3Y6WQzIn:wHRfE6DQviJWmZ3xYDAu
Malware Config
Signatures
Files
-
a75a8466ac4a4abeb9a613de95a72d2f10827d16cfb3f055a109f5aa5140fc75.exe windows x86
7b517af7ba44ed1a428a8877fa12c77c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleOutputCP
GlobalGetAtomNameW
GetDateFormatA
UnhandledExceptionFilter
WriteConsoleA
WriteFile
GetTimeFormatA
SetStdHandle
TerminateProcess
GetCurrentProcess
HeapReAlloc
GetLocaleInfoA
RtlUnwind
InitializeCriticalSection
GetSystemTimeAsFileTime
GetACP
IsDebuggerPresent
EnterCriticalSection
IsValidCodePage
EnumResourceNamesA
GetCPInfo
HeapSize
GetCPInfoExW
FreeLibrary
VirtualAlloc
SetUnhandledExceptionFilter
LoadLibraryA
GetCurrentProcessId
LeaveCriticalSection
GetOEMCP
MultiByteToWideChar
SetFilePointer
RaiseException
rpcrt4
RpcStringFreeA
shlwapi
SHCreateStreamOnFileA
PathIsContentTypeA
SHCreateStreamOnFileEx
PathIsFileSpecA
PathAppendA
PathCreateFromUrlW
Sections
.text Size: 135KB - Virtual size: 275KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 135KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ