Static task
static1
Behavioral task
behavioral1
Sample
1fbdc3fa64f47b84648e4c150749b5db6576fdc6beeae9158d856af65a44f79a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1fbdc3fa64f47b84648e4c150749b5db6576fdc6beeae9158d856af65a44f79a.exe
Resource
win10v2004-20220901-en
General
-
Target
1fbdc3fa64f47b84648e4c150749b5db6576fdc6beeae9158d856af65a44f79a
-
Size
99KB
-
MD5
193d3b636738493b3e38c881c954cde7
-
SHA1
b536d33ff87710be58a5cc78961a90ced53ab4cc
-
SHA256
1fbdc3fa64f47b84648e4c150749b5db6576fdc6beeae9158d856af65a44f79a
-
SHA512
cb509a45d22fcfe072c8ffc58deb08aa15b641a047cc628a0252d114c9b60e8dbc192340d93dfe40947f1d6a0d892b02c58db87b9d8f94ab6411d38466f345c6
-
SSDEEP
1536:qQRm0kOPaoZzq8IDOUMqO868hV09sxzdUg/TLhQDhNAb6xycNSt7:qj0kOP7ZdIaYj09mzdB/WHd0N
Malware Config
Signatures
Files
-
1fbdc3fa64f47b84648e4c150749b5db6576fdc6beeae9158d856af65a44f79a.exe windows x86
8752bd7a4c3f8199397a17a35c049686
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
GetTempPathA
CreateProcessA
CopyFileA
GetModuleFileNameA
WaitForSingleObject
HeapFree
RemoveDirectoryA
SetFilePointer
LoadLibraryA
GetStringTypeW
GetStringTypeA
FlushFileBuffers
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
RtlUnwind
SetStdHandle
SetEndOfFile
GetOEMCP
GetACP
GetCPInfo
CreateDirectoryA
SetEnvironmentVariableA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetFullPathNameA
GetDriveTypeA
GetTempFileNameA
HeapAlloc
CloseHandle
GetFileType
CreateFileA
ReadFile
WriteFile
GetProcAddress
SetHandleCount
DeleteFileA
MoveFileA
ExitProcess
TerminateProcess
GetCurrentProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
LCMapStringW
GetStdHandle
MultiByteToWideChar
LCMapStringA
WideCharToMultiByte
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
user32
DispatchMessageA
TranslateMessage
IsDialogMessageA
CreateDialogParamA
SetDlgItemTextA
DestroyWindow
MessageBoxA
GetDlgItem
SendMessageA
PeekMessageA
shell32
SHFileOperationA
Sections
.text Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ