Static task
static1
Behavioral task
behavioral1
Sample
a414795d8913ab5a8db7fa326c94b22ca424a1d1f52d34902e3f30b1275087c3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a414795d8913ab5a8db7fa326c94b22ca424a1d1f52d34902e3f30b1275087c3.exe
Resource
win10v2004-20220812-en
General
-
Target
a414795d8913ab5a8db7fa326c94b22ca424a1d1f52d34902e3f30b1275087c3
-
Size
219KB
-
MD5
79a9ee14604305692c0101439926ea81
-
SHA1
2667bfd65a0cbd36171e97aa938d07d18efb731a
-
SHA256
a414795d8913ab5a8db7fa326c94b22ca424a1d1f52d34902e3f30b1275087c3
-
SHA512
5ec42bed75e9879bcfec0ea8f57dd29d5f0802de98823aa6eb7d1cfd4ee37b62b15b874d8c011d9e0a1916e70e6c4b2c4541d90b6cc7ce156e968a4576430ff1
-
SSDEEP
1536:mlFtLBZVixrYxzOi3u7+g6IdOPRSGF9yvnsuLq1G9VB1egaF:ilixsxzOi3o+6dORbF9y/sumoVB1+
Malware Config
Signatures
Files
-
a414795d8913ab5a8db7fa326c94b22ca424a1d1f52d34902e3f30b1275087c3.exe windows x86
cb4dab79144a9f0a49159706d5d68bd3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenW
InitializeCriticalSection
GetCurrentProcess
DeleteCriticalSection
LoadLibraryA
GetSystemTimeAsFileTime
GetProcAddress
LocalFree
InterlockedIncrement
GetCurrentThreadId
HeapReAlloc
LoadLibraryW
lstrlenW
HeapDestroy
VirtualAlloc
MultiByteToWideChar
InterlockedDecrement
GetSystemTimeAsFileTime
GetSystemTimeAsFileTime
SetLastError
FreeLibrary
LoadLibraryA
VirtualAlloc
InitializeCriticalSection
GetModuleHandleA
GetCurrentProcess
Sleep
LocalAlloc
GetCurrentProcessId
GetCommandLineA
SetFilePointer
LoadLibraryA
GetModuleHandleA
TerminateProcess
GetTickCount
HeapReAlloc
FreeLibrary
HeapAlloc
GetStartupInfoW
LeaveCriticalSection
WideCharToMultiByte
GetCommandLineW
GetCommandLineA
SetUnhandledExceptionFilter
SetFilePointer
GetACP
SetFilePointer
GetCommandLineW
ExitProcess
LoadLibraryA
Sections
.text Size: 141KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 16KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 32KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE