Static task
static1
Behavioral task
behavioral1
Sample
887b32b9c895e1cccbfbca082ebc126b57e50a09e46a816040b0fe9eb14d97ac.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
887b32b9c895e1cccbfbca082ebc126b57e50a09e46a816040b0fe9eb14d97ac.exe
Resource
win10v2004-20221111-en
General
-
Target
887b32b9c895e1cccbfbca082ebc126b57e50a09e46a816040b0fe9eb14d97ac
-
Size
181KB
-
MD5
9b537fd60d0bfa03d542620301b88a42
-
SHA1
9462d63703d478948ab085e94a3def6dff51d0d3
-
SHA256
887b32b9c895e1cccbfbca082ebc126b57e50a09e46a816040b0fe9eb14d97ac
-
SHA512
c4768e13fd975457e479f8846223b6c15501204a301a071277a06f9dbbf42e325821af6fb3088470e962c6f77cee57f351f447f4bf1603a94940b66684776660
-
SSDEEP
3072:hBLqWy0Ayo3yE/YU6IkZVjoVUitgTN+6SALFjjmkJXqnl138GK47B:hBLhO3yE/YpLPQUiGYLALFHjJXq73NT
Malware Config
Signatures
Files
-
887b32b9c895e1cccbfbca082ebc126b57e50a09e46a816040b0fe9eb14d97ac.exe windows x86
cf13560f112ae1caded8eaaae1f4a12a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetStdHandle
IsDebuggerPresent
VirtualAlloc
HeapReAlloc
GlobalGetAtomNameW
SetUnhandledExceptionFilter
SetFilePointer
InitializeCriticalSection
GetDateFormatA
WriteFile
WriteConsoleA
GetOEMCP
HeapSize
GetLocaleInfoA
UnhandledExceptionFilter
LeaveCriticalSection
MultiByteToWideChar
LoadLibraryA
GetACP
EnumResourceNamesA
GetCurrentProcessId
TerminateProcess
IsValidCodePage
GetCPInfoExW
GetCurrentProcess
GetConsoleOutputCP
RtlUnwind
GetTimeFormatA
FreeLibrary
EnterCriticalSection
GetSystemTimeAsFileTime
GetCPInfo
RaiseException
shlwapi
SHCreateStreamOnFileA
PathIsContentTypeA
SHCreateStreamOnFileEx
PathIsFileSpecA
PathAppendA
PathCreateFromUrlW
rpcrt4
RpcStringFreeA
Sections
.text Size: 90KB - Virtual size: 237KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ