Static task
static1
Behavioral task
behavioral1
Sample
adc454518c7d89b10d194736c6248a4ee0246fc89ab0cfe1dd871da600c3a5f4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
adc454518c7d89b10d194736c6248a4ee0246fc89ab0cfe1dd871da600c3a5f4.exe
Resource
win10v2004-20220812-en
General
-
Target
adc454518c7d89b10d194736c6248a4ee0246fc89ab0cfe1dd871da600c3a5f4
-
Size
208KB
-
MD5
ba2579ba04b87b825b3d40ba3f4490bd
-
SHA1
ca00e762c2add1965719eeeb51114489d3d5a64e
-
SHA256
adc454518c7d89b10d194736c6248a4ee0246fc89ab0cfe1dd871da600c3a5f4
-
SHA512
e581beb78857f6f1c5d3baf953b39adb9aab90eb1573e9905afecb295e51fc6160370c32fa52db86bb6a9230d72f718ccebd9bf0bf0696ecff2317610702b24d
-
SSDEEP
3072:NH0K5NB2d/LSlMdjnvJNvZrI8y0lRVC3J4a1ACl97RI6u22wu8+9DW:N7iLS6NRy0lR043CHF+lwy
Malware Config
Signatures
Files
-
adc454518c7d89b10d194736c6248a4ee0246fc89ab0cfe1dd871da600c3a5f4.exe windows x86
f17e0f54e69cce3ffe4c26be3dbd0b0b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetCurrentDirectoryA
GetCurrentThreadId
GetConsoleOutputCP
MulDiv
GetThreadLocale
GetModuleHandleA
GetModuleHandleW
lstrcmpA
DeleteFileA
lstrcmpiA
lstrlenA
GlobalFindAtomA
GlobalFindAtomW
GetCurrentThread
GetProcessHeap
lstrlenW
lstrcmpiW
GetUserDefaultLangID
GetCurrentProcessId
RemoveDirectoryA
GetWindowsDirectoryA
GetStartupInfoA
GetCurrentProcess
Sleep
IsDebuggerPresent
CopyFileA
DeleteFileW
GetCommandLineA
GetTickCount
GetLastError
GetDriveTypeA
QueryPerformanceCounter
GetACP
LoadLibraryW
GetCommandLineW
GetOEMCP
SetLastError
GetVersion
VirtualAlloc
user32
CharNextA
GetDesktopWindow
GetSystemMetrics
GetDC
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ