Static task
static1
Behavioral task
behavioral1
Sample
33244eaf343d52a11efc08c7b99aed87267e82228152ac624ab155f940f9d8f7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
33244eaf343d52a11efc08c7b99aed87267e82228152ac624ab155f940f9d8f7.exe
Resource
win10v2004-20220901-en
General
-
Target
33244eaf343d52a11efc08c7b99aed87267e82228152ac624ab155f940f9d8f7
-
Size
46KB
-
MD5
a3d579f7a8df7b07023cd200cdff1bef
-
SHA1
dfc5800b4fbc6cc18512808c235b49fc64b4ad5c
-
SHA256
33244eaf343d52a11efc08c7b99aed87267e82228152ac624ab155f940f9d8f7
-
SHA512
020f8a21aa991d1ce1a02a8d74978810fa9aaecb4388a2156596db2c86218c855df9ab216def74f421534ce2a91fe3724ddf18dcad00987d6018b72134094fff
-
SSDEEP
768:dBDHLBMRodzRchbVtLB14IOiCfOG+3ZPCXkPqLPvVRFfXw:dDh2hTL/ZLCGGGyLFLP
Malware Config
Signatures
Files
-
33244eaf343d52a11efc08c7b99aed87267e82228152ac624ab155f940f9d8f7.exe windows x86
8f6002cd0114055b1ba401ee3a13df86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
NtAddAtom
atl
AtlMarshalPtrInProc
kernel32
FreeLibrary
SetLastError
VirtualAlloc
QueryPerformanceCounter
LoadLibraryW
GetProcAddress
GetSystemTimeAsFileTime
DisableThreadLibraryCalls
GetCurrentProcessId
GetModuleHandleA
GetTickCount
Sections
.textbss Size: - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 512B - Virtual size: 424B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 448B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.idata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vgspcdp Size: - Virtual size: 72KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE