Static task
static1
Behavioral task
behavioral1
Sample
9ab5fd1bfb106645d62710fed047e652aa81542130ed234982f1a70fe8a4dd24.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9ab5fd1bfb106645d62710fed047e652aa81542130ed234982f1a70fe8a4dd24.exe
Resource
win10v2004-20221111-en
General
-
Target
9ab5fd1bfb106645d62710fed047e652aa81542130ed234982f1a70fe8a4dd24
-
Size
75KB
-
MD5
abc7653df987b5b8eda03608b6284c1b
-
SHA1
0a5d2b55d34a3c8ee908c82e4aa7f12acb89dc1e
-
SHA256
9ab5fd1bfb106645d62710fed047e652aa81542130ed234982f1a70fe8a4dd24
-
SHA512
1297cc2345203b4ff399830dc037c456584b633869f4bceea52ec7c5779825b36f300c948763f0180d61411c24ec427e4a02bcae6107c0ceb5f5783709096640
-
SSDEEP
1536:Re01HG3pMyz/tbtgao+N1XuO2MJe4ciDkPNBIVz2TCABiZ:8Bppbtgx+N1FJLcMPz2eL
Malware Config
Signatures
Files
-
9ab5fd1bfb106645d62710fed047e652aa81542130ed234982f1a70fe8a4dd24.exe windows x86
e9a01b1952bfdab870ff530c2b6064d6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlMoveMemory
VirtualQuery
GetExitCodeProcess
lstrcmpiW
GetWindowsDirectoryA
GetModuleFileNameA
EnumCalendarInfoA
SystemTimeToFileTime
GetCurrentThread
VirtualProtect
SetFileAttributesW
GetCommandLineW
GlobalReAlloc
GetACP
SizeofResource
SetLastError
IsDebuggerPresent
IsBadWritePtr
SetFileAttributesA
LoadResource
GetThreadLocale
FileTimeToDosDateTime
GetSystemDefaultLCID
DeleteFileA
GetProcAddress
GetLocaleInfoA
GetTempPathA
GetModuleHandleA
msvcrt
__p__commode
_except_handler3
_adjust_fdiv
__p__fmode
_exit
_XcptFilter
_controlfp
__getmainargs
__p___initenv
__set_app_type
_initterm
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE