Static task
static1
Behavioral task
behavioral1
Sample
a567daeacbd49892a7f4261b391361430bca51a494c6e8709a1ad60829edbb91.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a567daeacbd49892a7f4261b391361430bca51a494c6e8709a1ad60829edbb91.exe
Resource
win10v2004-20221111-en
General
-
Target
a567daeacbd49892a7f4261b391361430bca51a494c6e8709a1ad60829edbb91
-
Size
38KB
-
MD5
ad6cab2d833e9bd7a7a6d10d88bfc4b7
-
SHA1
87319c86094836819f0410abc2daed3cf62a139e
-
SHA256
a567daeacbd49892a7f4261b391361430bca51a494c6e8709a1ad60829edbb91
-
SHA512
714c228a970e205b54b94015512864d3bdec665891d14a2a058044716816126510e7c6d58c4c360967d1059f77377cf921138f0b21b3e1d6a865c3ba8722b38d
-
SSDEEP
768:X/B2hgfLa+ZVyyakHDvxDcpPlGSG8BRPn:PvVyy5HDvxDUNGSG8BRPn
Malware Config
Signatures
Files
-
a567daeacbd49892a7f4261b391361430bca51a494c6e8709a1ad60829edbb91.exe windows x86
69be3161ce449dc8d8bccedebd1ec504
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsBadCodePtr
OpenEventA
SetConsoleNumberOfCommandsA
Module32Next
WaitForDebugEvent
GetEnvironmentStringsA
LocalFlags
RtlMoveMemory
GetPriorityClass
UnregisterConsoleIME
VirtualAlloc
OpenFileMappingA
GetCurrentProcess
WriteConsoleInputA
WritePrivateProfileSectionA
OpenMutexA
ReadFileScatter
SetInformationJobObject
GetCommModemStatus
IsBadStringPtrA
CreateNamedPipeA
DeviceIoControl
RequestWakeupLatency
GetLastError
advapi32
CredUnmarshalCredentialA
CredMarshalCredentialW
dpmodemx
SPInit
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ