Static task
static1
Behavioral task
behavioral1
Sample
a3c9fb4a058ff6d374f6775792d855ec5636355fa88a3df7ae71f1fb92f63f87.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a3c9fb4a058ff6d374f6775792d855ec5636355fa88a3df7ae71f1fb92f63f87.exe
Resource
win10v2004-20221111-en
General
-
Target
a3c9fb4a058ff6d374f6775792d855ec5636355fa88a3df7ae71f1fb92f63f87
-
Size
18KB
-
MD5
5304b38896949263ec692c48f1ed7f5f
-
SHA1
7f4ee770a5b20bdbf8eae86ed9b353cdca8fca19
-
SHA256
a3c9fb4a058ff6d374f6775792d855ec5636355fa88a3df7ae71f1fb92f63f87
-
SHA512
2d406728f3d7a6fcbd3553bd2263cc6a65b5a7b5166304f3e73fb1fcc6d096e0847dac78a8ac49b343d05ba7836e1be55e885e01ba7ef47a4729bf3d68934044
-
SSDEEP
384:7gXkX1HRLt1xgCN3W9Im90+byNJp6dBow8Kw:7yi1HbgCwIFHp6dSLKw
Malware Config
Signatures
Files
-
a3c9fb4a058ff6d374f6775792d855ec5636355fa88a3df7ae71f1fb92f63f87.exe windows x86
f9c4a4f27a43e3c3bf3b5c6fca374645
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
AddAtomA
ExitProcess
FindAtomA
GetAtomNameA
GetModuleHandleA
GetProcAddress
OpenProcess
ReadFile
SetUnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_iob
_onexit
_setmode
abort
atexit
free
malloc
memcpy
signal
user32
MessageBoxA
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 376B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 912B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE