Static task
static1
Behavioral task
behavioral1
Sample
a445655503d769e6ab823fe7705f7aebfa0e74f383d3b634a54910f46bc52a53.exe
Resource
win7-20221111-en
General
-
Target
a445655503d769e6ab823fe7705f7aebfa0e74f383d3b634a54910f46bc52a53
-
Size
97KB
-
MD5
89853a2c8e7a48a82c762669c9278ed8
-
SHA1
c89748e900fd2c3846a17c3e79797752709c6959
-
SHA256
a445655503d769e6ab823fe7705f7aebfa0e74f383d3b634a54910f46bc52a53
-
SHA512
62a4ca86cdb51ba21a6b9f2d48ff83f63365a6d4907030edee444ecf7d1e2115287951092789d7e7b6260d5090979e3101eef54febf5ab94e013bd9974f94d80
-
SSDEEP
3072:U9xAjxAO2Nmv1zxy7vZWsEYQ/XSHHJKSZ/2:0xixt2Nmv+MaqX6pLZe
Malware Config
Signatures
Files
-
a445655503d769e6ab823fe7705f7aebfa0e74f383d3b634a54910f46bc52a53.exe windows x86
1dbe3555e04206148ad13c8956bc9b18
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_except_handler3
atoi
memcpy
memset
??2@YAPAXI@Z
strtok
getenv
??3@YAXPAX@Z
kernel32
GetStartupInfoA
lstrcmpiA
GetCurrentProcess
IsDebuggerPresent
GetModuleHandleA
LoadLibraryA
GetProcAddress
GetModuleFileNameA
lstrcpyA
lstrcmpA
CreateMutexA
GetLastError
lstrcatA
CreateThread
CreateFileA
WriteFile
CloseHandle
WaitForSingleObject
lstrlenA
ExitProcess
advapi32
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ