Static task
static1
Behavioral task
behavioral1
Sample
b3da1234b1ee9462a058305bd1c60d72b42ca4d3fe13b0df76d05f2fe6376fd1.exe
Resource
win7-20220812-en
General
-
Target
b3da1234b1ee9462a058305bd1c60d72b42ca4d3fe13b0df76d05f2fe6376fd1
-
Size
306KB
-
MD5
8a776bdba6cdc435ace90f7fdc3e6380
-
SHA1
e856441fe3ec42eab1fea3a9b9d4ab3c8269930b
-
SHA256
b3da1234b1ee9462a058305bd1c60d72b42ca4d3fe13b0df76d05f2fe6376fd1
-
SHA512
2552126f82e905adbf0a8653d36b938dc713ab7848011c3429e779d2b65b8039ae48a53353fb59eca16cafe55b4cd06a1d3e887a4e36830a804ea97c778bbd6f
-
SSDEEP
6144:pdldaZtStdW+uErqktGqHLs8VGpJqUaQAcFKqMAdXhwNTCkHki:pbdaZktdWFErqq1Ls8VSUdck+WNTsi
Malware Config
Signatures
Files
-
b3da1234b1ee9462a058305bd1c60d72b42ca4d3fe13b0df76d05f2fe6376fd1.exe windows x86
ce7532d8ab10f1f3db59a877b2263051
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
AddAtomA
ExitProcess
FindAtomA
GetAtomNameA
GetFileSize
GetModuleHandleA
GetProcAddress
OpenProcess
ResumeThread
SetThreadContext
SetUnhandledExceptionFilter
VirtualFree
VirtualProtect
VirtualQuery
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_iob
_onexit
_setmode
abort
atexit
exit
fgetc
fopen
free
fseek
malloc
memcpy
signal
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 448B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 432B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 297KB - Virtual size: 337KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE