Static task
static1
Behavioral task
behavioral1
Sample
a4f91588434dfb573cfac130425bd0ade1ddd362143b163df13b6dc2f4091c0f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a4f91588434dfb573cfac130425bd0ade1ddd362143b163df13b6dc2f4091c0f.exe
Resource
win10v2004-20220812-en
General
-
Target
a4f91588434dfb573cfac130425bd0ade1ddd362143b163df13b6dc2f4091c0f
-
Size
195KB
-
MD5
6fcec8e37359bb62cf14cb3d82bc9f3d
-
SHA1
36bb2d9f710dda4d7f7060ee1a046082c0e59487
-
SHA256
a4f91588434dfb573cfac130425bd0ade1ddd362143b163df13b6dc2f4091c0f
-
SHA512
70962240cee61334e1c06b057f78178bb74cb62b3cdaa6beaa2f1e60fd9b6dc48098502f7ee64468ff25505c29c6f4e80cb34a45effb93faa51f976081835519
-
SSDEEP
6144:4bR2jaj80vPD9UedhZGqp8RrU/KAT5aywKNr0:4bR2jajj9fLZGqKiVaywE0
Malware Config
Signatures
Files
-
a4f91588434dfb573cfac130425bd0ade1ddd362143b163df13b6dc2f4091c0f.exe windows x86
24bed1e981dd6fddad8259cf05b966fe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
strcmp
memmove
memcpy
strlen
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
CloseHandle
InitializeCriticalSection
GetModuleFileNameA
HeapFree
FreeLibrary
LoadLibraryA
GetProcAddress
EnterCriticalSection
HeapReAlloc
HeapAlloc
LeaveCriticalSection
TlsGetValue
TlsSetValue
TlsAlloc
WaitForMultipleObjects
GetCurrentThreadId
GetCurrentProcess
GetCurrentThread
DuplicateHandle
CreateSemaphoreA
CreateThread
ReleaseSemaphore
wsock32
closesocket
WSACleanup
WSAStartup
Sections
.code Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE