Static task
static1
Behavioral task
behavioral1
Sample
137302df94e5ab6fe41dd7cb9af864dd2dff92c1bb19f1639a4e616c02049a57.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
137302df94e5ab6fe41dd7cb9af864dd2dff92c1bb19f1639a4e616c02049a57.exe
Resource
win10v2004-20220901-en
General
-
Target
137302df94e5ab6fe41dd7cb9af864dd2dff92c1bb19f1639a4e616c02049a57
-
Size
112KB
-
MD5
4517b7773211126c54a32eb49d553eb6
-
SHA1
cfe34ae6e35305bfb4de6afa38141567ec45665b
-
SHA256
137302df94e5ab6fe41dd7cb9af864dd2dff92c1bb19f1639a4e616c02049a57
-
SHA512
ec3003e90caa20fe83baf1093fa87f9c989030f69018a633487e1335e79697cda9d6db86692392074d0aa1731cb2c28ffdd29b1abb245356acc6af55fa6ad59a
-
SSDEEP
1536:4Ox/6F1eoo5f7w0RodQT4FiBm4iQZw07rqUrnzex2fP8riuQAnzyFfhTttjBJqqJ:4ON6F7oPRodQTHB51Tax2f0AYM
Malware Config
Signatures
Files
-
137302df94e5ab6fe41dd7cb9af864dd2dff92c1bb19f1639a4e616c02049a57.exe windows x86
32fe84e32df295a38dbe94354b79abb7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CompareStringW
GetShortPathNameA
DuplicateHandle
CreateProcessA
FileTimeToLocalFileTime
GetCommandLineW
GetModuleHandleW
GetProcessHeap
GetWindowsDirectoryA
IsBadCodePtr
VirtualProtectEx
GetProcAddress
SetUnhandledExceptionFilter
GlobalUnlock
msvcrt
__p__commode
_XcptFilter
_exit
__getmainargs
_initterm
calloc
free
__setusermatherr
_except_handler3
_adjust_fdiv
__set_app_type
_controlfp
__p___initenv
__p__fmode
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ