Static task
static1
Behavioral task
behavioral1
Sample
a4137ed88cbf212be1879193917035114ab6904341b3e5c934e3514cfa01695f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a4137ed88cbf212be1879193917035114ab6904341b3e5c934e3514cfa01695f.exe
Resource
win10v2004-20221111-en
General
-
Target
a4137ed88cbf212be1879193917035114ab6904341b3e5c934e3514cfa01695f
-
Size
400KB
-
MD5
d1c1425dfef37eb516a0f3e049f44ec1
-
SHA1
9ff3967c53c037e3bd838b360c0764f599363c0d
-
SHA256
a4137ed88cbf212be1879193917035114ab6904341b3e5c934e3514cfa01695f
-
SHA512
e6758b56e37f6bfbfb08ae7146a057e64ba9d56b609948b41b95b3ff4c9b4a24444bc083de56854f63d3e6caf381072618577cc887e3cd806f5c884c571f88cc
-
SSDEEP
12288:03aldkSr3WV1C3yD8LjDNHkRPVIFaDQoyazsf+R21taJ:XAw3yD8LXFk/IFswG/J
Malware Config
Signatures
Files
-
a4137ed88cbf212be1879193917035114ab6904341b3e5c934e3514cfa01695f.exe windows x86
4710e694cbc904bbde58b1960e1a3f6b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
GetProcessHeap
HeapFree
GetTickCount
GetModuleFileNameW
SetEnvironmentVariableW
GetCurrentProcessId
OpenFileMappingW
GetLastError
MapViewOfFile
CloseHandle
CreateFileW
CreateFileMappingW
UnmapViewOfFile
GetFileInformationByHandle
VirtualAlloc
VirtualFree
GetModuleHandleA
GetFileSizeEx
GetProcAddress
LoadLibraryW
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xcpad Size: - Virtual size: 36KB
.idata Size: 1024B - Virtual size: 692B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 424B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ