Static task
static1
Behavioral task
behavioral1
Sample
a68b6967261ff2bb1028c8b99d69c393dc00aa4e5f222a4aadfa7da7a6d5636e.exe
Resource
win7-20220812-en
General
-
Target
a68b6967261ff2bb1028c8b99d69c393dc00aa4e5f222a4aadfa7da7a6d5636e
-
Size
192KB
-
MD5
1917682a20dcdaf4fd24015eb30c6970
-
SHA1
113cc652a4955d36f42d7cf77bd739591c7ed498
-
SHA256
a68b6967261ff2bb1028c8b99d69c393dc00aa4e5f222a4aadfa7da7a6d5636e
-
SHA512
f282aab2dd667f4ad993c696983d0ddbdef431fde7d8dc4fab6703ac573918b3b9630306f140fc50bd2fa7c57c2195eb4d185514c067ce14f9cf77e32a012d0f
-
SSDEEP
3072:LDZrrTt3fP9ZGFwgvRLLCzOYFDq+UdnIPPlMzcsofIw+KaX0LcHLkMIIRo:/ph96wgvRHCzOYtqlGyzcsX3KA0LQIQK
Malware Config
Signatures
Files
-
a68b6967261ff2bb1028c8b99d69c393dc00aa4e5f222a4aadfa7da7a6d5636e.exe windows x86
29637e11e194dc0202df96c219ccfc7d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
GetProcessHeap
VirtualAlloc
VirtualProtect
VirtualFree
GetProcAddress
LoadLibraryA
IsBadReadPtr
HeapFree
FreeLibrary
ExitProcess
GetFileAttributesA
GetWindowsDirectoryA
GetVersionExA
GetStringTypeA
LCMapStringW
HeapReAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
GetModuleFileNameA
GetEnvironmentVariableA
HeapDestroy
HeapCreate
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
RtlUnwind
WriteFile
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
LCMapStringA
GetStringTypeW
user32
wsprintfA
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 160KB - Virtual size: 161KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 644B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ