Static task
static1
Behavioral task
behavioral1
Sample
74c5710f4ca53fef83950ad381fdb8e6c2eaa46e879cd5dbb77914e1b75e5033.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
74c5710f4ca53fef83950ad381fdb8e6c2eaa46e879cd5dbb77914e1b75e5033.exe
Resource
win10v2004-20220901-en
General
-
Target
74c5710f4ca53fef83950ad381fdb8e6c2eaa46e879cd5dbb77914e1b75e5033
-
Size
59KB
-
MD5
a9f6211f878e2aba35c8ed6bd9e2f15f
-
SHA1
9441a839aa87d37b1a969355f5a8b61a297e1cbe
-
SHA256
74c5710f4ca53fef83950ad381fdb8e6c2eaa46e879cd5dbb77914e1b75e5033
-
SHA512
33a2fe6d3fad3ddb1224e5f9ae02a1c54b5a3e911ab7bf4e90759dc424a78316163ef9df9c03b7de9cabd30e0842be865677c71a7cfff3fdb03f6dfb98f3c737
-
SSDEEP
1536:M5hV9Jo872ScVhw0f1UQYAfwDWrs5KetG9hRFfMn:M57bo8kduAfY5KAG9h3f
Malware Config
Signatures
Files
-
74c5710f4ca53fef83950ad381fdb8e6c2eaa46e879cd5dbb77914e1b75e5033.exe windows x86
8be4974cbfff455c906656fa0e2a2be1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiA
CreateNamedPipeA
GetLogicalDriveStringsA
Sleep
lstrcmpiA
lstrcmpiA
GetVolumePathNameA
CreateMailslotA
FileTimeToLocalFileTime
SuspendThread
SetLastError
GetProcessHeap
lstrcmpiA
DeleteFileA
WaitForSingleObject
GetStdHandle
lstrlenA
GetModuleHandleA
IsValidLocale
GetModuleFileNameA
GetDriveTypeW
HeapCreate
lstrcmpiA
scecli
SceOpenPolicy
SceSysPrep
InitializeChangeNotify
DeltaNotify
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.adata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 50KB - Virtual size: 49KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 788B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ