Static task
static1
Behavioral task
behavioral1
Sample
d07b12781662aa8bc771c281017ac6ef835b7232561144636b8acbbb04ecb2ea.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d07b12781662aa8bc771c281017ac6ef835b7232561144636b8acbbb04ecb2ea.exe
Resource
win10v2004-20220812-en
General
-
Target
d07b12781662aa8bc771c281017ac6ef835b7232561144636b8acbbb04ecb2ea
-
Size
75KB
-
MD5
4161bda9995f0bc79d484b0b6aec3e11
-
SHA1
23668b82100d0626cc1556d20f3b76949c17eb7d
-
SHA256
d07b12781662aa8bc771c281017ac6ef835b7232561144636b8acbbb04ecb2ea
-
SHA512
7f3f22c41ac97448e9a29b8c7d56068a2908b3ab9df7fc11bb830148e5097b1d3e903c7b3ae11b10d8ed47c461b6916c38642fcf41fbfd9c3c9aa4d1cde878ad
-
SSDEEP
1536:vVoRR0gVpq2+PVABAFrf393XOavhH1HucyEjKA06KaFxvX7x3Yi1wYpO9:vVoRRzVg2+PmBEf39JhVBd08LflYhV
Malware Config
Signatures
Files
-
d07b12781662aa8bc771c281017ac6ef835b7232561144636b8acbbb04ecb2ea.exe windows x86
ed669bd2a986674320268573e8fcc082
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
SizeofResource
GetShortPathNameA
GetExitCodeProcess
IsDBCSLeadByte
DeviceIoControl
InterlockedIncrement
GetFileAttributesW
RtlMoveMemory
GetFullPathNameA
FreeEnvironmentStringsA
GetCommandLineA
DeleteFileA
MultiByteToWideChar
GetStringTypeExA
GetProcAddress
GetTempPathA
GetModuleHandleA
GetCurrentProcessId
VirtualProtect
GetCPInfo
QueryPerformanceCounter
GetCurrentThread
GetStringTypeA
GlobalReAlloc
GetCommandLineW
GetStartupInfoW
ExitProcess
LoadResource
GetDateFormatA
GetThreadLocale
msvcrt
_adjust_fdiv
_XcptFilter
__p__fmode
__p___initenv
__set_app_type
_initterm
_exit
__getmainargs
_except_handler3
__p__commode
_controlfp
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ