Static task
static1
Behavioral task
behavioral1
Sample
5a2c6e630c08111b019d924d1e48399871690d7ecceba0b4faa386637266ee01.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5a2c6e630c08111b019d924d1e48399871690d7ecceba0b4faa386637266ee01.exe
Resource
win10v2004-20221111-en
General
-
Target
5a2c6e630c08111b019d924d1e48399871690d7ecceba0b4faa386637266ee01
-
Size
147KB
-
MD5
f93f1b2a6d6cef4943ee4ce91235fe5d
-
SHA1
0fac889bce849edefa663682e3b6099ed9a58f87
-
SHA256
5a2c6e630c08111b019d924d1e48399871690d7ecceba0b4faa386637266ee01
-
SHA512
58f00805524dd6c552e61f36330383713340ebf54412d6f4a4f7b4c51523df403a05a979798b3c880f15add65a3b290f15f17f7f2f4c25dc9632a9d4bf7be357
-
SSDEEP
1536:qNNiBbH+EkFU5pT0bNkp7Vgjnqym4cbNA04RaAWj6wpUz:qNhEKUrgb2p7VgjqypcRA0eaA8gz
Malware Config
Signatures
Files
-
5a2c6e630c08111b019d924d1e48399871690d7ecceba0b4faa386637266ee01.exe windows x86
b3ebe50c05d2243cce7bcd2addf4c91b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteConsoleOutputCharacterA
IsDebuggerPresent
SetThreadIdealProcessor
FindResourceExA
VirtualAlloc
CreateFileMappingA
GetPriorityClass
GetComputerNameA
GetLastError
GetProcessId
GetLogicalDriveStringsA
UnregisterWait
DeviceIoControl
GetProfileIntA
CreateDirectoryExA
GetProcessWorkingSetSize
LoadLibraryExA
ResumeThread
CreateNamedPipeA
RtlMoveMemory
WaitNamedPipeA
GetVersionExA
WriteProfileSectionA
advapi32
CredFree
CredMarshalCredentialW
dpmodemx
SPInit
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 49KB - Virtual size: 292KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.trdata Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE