Static task
static1
Behavioral task
behavioral1
Sample
a22a1d78ca282583406bd0eb53a2921f6da8e062e53dd024df1fea16fc16850b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a22a1d78ca282583406bd0eb53a2921f6da8e062e53dd024df1fea16fc16850b.exe
Resource
win10v2004-20220812-en
General
-
Target
a22a1d78ca282583406bd0eb53a2921f6da8e062e53dd024df1fea16fc16850b
-
Size
748KB
-
MD5
ce05874eed463cbcc1d9b1cf0f571f1b
-
SHA1
bb4ebead7b4ae6dad760bb6a6d2481ff31c1bb7e
-
SHA256
a22a1d78ca282583406bd0eb53a2921f6da8e062e53dd024df1fea16fc16850b
-
SHA512
84af525d85c3f5305f3cdb3a35cfa09947967173e98216d1c0a9a88d6cfee2f689be42322ddf4706230f62a131536012389a791e2c0ba36e5f794aa409139552
-
SSDEEP
12288:u/BkyvYqGY6av21uBJFIp7ndQjo5cr11yogXAh8f07OScXzSlfYnO5V:UBLww6OvnFIpbeo6rTTwAhc1zsJ5V
Malware Config
Signatures
Files
-
a22a1d78ca282583406bd0eb53a2921f6da8e062e53dd024df1fea16fc16850b.exe windows x86
08d80a7d54282ba51bb089e47a5bf8fa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
GetProcessHeap
DeleteAtom
CreatePipe
AddAtomA
HeapFree
IsBadWritePtr
FindClose
RemoveDirectoryA
GetFileType
ExitThread
CloseHandle
CreateDirectoryA
SetVolumeLabelA
ClearCommBreak
SetEndOfFile
GetCommandLineA
CreateSemaphoreW
GetModuleFileNameA
WaitForMultipleObjects
FindAtomA
RemoveDirectoryA
HeapCreate
GetModuleHandleA
GetDriveTypeW
clbcatq
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
msvidc32
DriverProc
DriverProc
DriverProc
DriverProc
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 740KB - Virtual size: 740KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE