Static task
static1
Behavioral task
behavioral1
Sample
887abbde1fdd06f197e73615e1abb0b3934aad1f41e294730d08152ac3f3e174.exe
Resource
win7-20221111-en
General
-
Target
887abbde1fdd06f197e73615e1abb0b3934aad1f41e294730d08152ac3f3e174
-
Size
167KB
-
MD5
acbf492ba021f6df02e77ccf382c01c6
-
SHA1
a81838fa1c09b0f057448ae9f48e498947a6150a
-
SHA256
887abbde1fdd06f197e73615e1abb0b3934aad1f41e294730d08152ac3f3e174
-
SHA512
2a91a720c37f778fab8fe374f83eb114d1c7d02ab4a1f3fafbd9efd005cdf144a1a625186b0742a2fc5212a7b684557a824371244d79b2cdab2ec5610132b4dd
-
SSDEEP
3072:s8flsiAunhdfmCsohtTc+T4CBD3kSj7cPZk2t5lhN/vU8FqSRDIl3VQr:sdJu/DsohtTxBLrHcPP0hS1uQr
Malware Config
Signatures
Files
-
887abbde1fdd06f197e73615e1abb0b3934aad1f41e294730d08152ac3f3e174.exe windows x86
2dc6402ba70c8d4ab40fa57054d7f758
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
lstrcatA
InitializeCriticalSection
GetProcAddress
LocalFree
RaiseException
LocalAlloc
GetModuleHandleA
LeaveCriticalSection
EnterCriticalSection
SearchPathA
ResumeThread
WriteProcessMemory
HeapValidate
GetCurrentThreadId
QueryPerformanceCounter
QueryPerformanceFrequency
GetPrivateProfileSectionA
GetStringTypeA
LCMapStringW
LCMapStringA
RtlUnwind
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
user32
DefWindowProcA
AdjustWindowRectEx
Sections
0 Size: 26KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
1 Size: 78KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
2 Size: 48KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
3 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
4 Size: 10KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE