Static task
static1
Behavioral task
behavioral1
Sample
a123bb7e87452c54471db18c0e1929c1b5de90caa17732b2c12cb698d9291b55.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a123bb7e87452c54471db18c0e1929c1b5de90caa17732b2c12cb698d9291b55.exe
Resource
win10v2004-20221111-en
General
-
Target
a123bb7e87452c54471db18c0e1929c1b5de90caa17732b2c12cb698d9291b55
-
Size
140KB
-
MD5
c7db6025a736601308650a00559ac53f
-
SHA1
73aa462ac0650e598c297bf3c2b63cb09c9a12e2
-
SHA256
a123bb7e87452c54471db18c0e1929c1b5de90caa17732b2c12cb698d9291b55
-
SHA512
fe339a24c0da8e892de2dbf45ba28348a5bdb7dd59ab65a0f0723a7e64df4d48a5e14a64813ccf5e3a0d1c582e381d04d1c83a2926593c84501a10c0e46fbee3
-
SSDEEP
3072:YLCo+VYYWeiZwBuqMsm3ONrE0kANhX09Z:To+6YW/ZKPMd3sEsD09
Malware Config
Signatures
Files
-
a123bb7e87452c54471db18c0e1929c1b5de90caa17732b2c12cb698d9291b55.exe windows x86
69d3d0a2b864eff2c9a05213a571a3c7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
OpenEventA
CreateFileA
ExitProcess
GetFileAttributesA
HeapAlloc
GetProcessHeap
HeapReAlloc
CloseHandle
lstrlenA
GetSystemTimeAsFileTime
RtlUnwind
InterlockedExchange
VirtualQuery
GetSystemDirectoryA
SetCurrentDirectoryA
WritePrivateProfileStringA
GetFullPathNameA
HeapFree
user32
wvsprintfA
advapi32
CloseServiceHandle
StartServiceA
CreateServiceA
OpenSCManagerA
shell32
DragAcceptFiles
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 134KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE