Static task
static1
Behavioral task
behavioral1
Sample
a4362d2cbda9e81828ab3eb0d9ff497e64233e2096046ec7ed8d99f45dd3693c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a4362d2cbda9e81828ab3eb0d9ff497e64233e2096046ec7ed8d99f45dd3693c.exe
Resource
win10v2004-20220901-en
General
-
Target
a4362d2cbda9e81828ab3eb0d9ff497e64233e2096046ec7ed8d99f45dd3693c
-
Size
124KB
-
MD5
ec616cfd3e02f143cf0ec9b34f2a7b72
-
SHA1
2eeffd655a11a382c24379e760041d6084b030e9
-
SHA256
a4362d2cbda9e81828ab3eb0d9ff497e64233e2096046ec7ed8d99f45dd3693c
-
SHA512
3687bd257f9da6dd567c8b6a84eddd757f5f54e2c43f0029cd83dd7cca92f90efa0b9cfde2633b843678816ca82f2272bc13c56f5d89a5d85b1663688935e2bc
-
SSDEEP
3072:xx3fCxr15dS2FbDuqJuhZKMhDHVmLL+XCyEtiNxsb:bKtd9FbchZKMhDHadm
Malware Config
Signatures
Files
-
a4362d2cbda9e81828ab3eb0d9ff497e64233e2096046ec7ed8d99f45dd3693c.exe windows x86
2342acffe1144d9eb472848f60b1c420
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDiskFreeSpaceA
HeapReAlloc
GetConsoleMode
WriteTapemark
ProcessIdToSessionId
ReadFile
FlushFileBuffers
GetCommandLineA
ExitProcess
GetStartupInfoA
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ