Static task
static1
Behavioral task
behavioral1
Sample
b1fcc855dc471e84a37921f79f796fc5f4b7e5f853bfae415daa219daaa13c6c.exe
Resource
win7-20220812-en
General
-
Target
b1fcc855dc471e84a37921f79f796fc5f4b7e5f853bfae415daa219daaa13c6c
-
Size
316KB
-
MD5
ea8259a3e0be83ca3b20bf24023fa9b1
-
SHA1
fb72d3b0fb5b4975d9c65d398764091d2b3d0675
-
SHA256
b1fcc855dc471e84a37921f79f796fc5f4b7e5f853bfae415daa219daaa13c6c
-
SHA512
5c1e381c7544ad1fd09e7639b93a487726da4e892fcd5fc4d6e647fbc5c54c1faad2006012e1206e2081241514bfda77eb7b38453cefbed530574571da289d8a
-
SSDEEP
6144:1w+0uT8Xu8qC2g5uEjK9zUNOlj6TeMmff4ywkyAECfa7YJh9CFelqXGAxkaLlo:1w+0uKqC2EfjKqOlj6TJmXtRfa2h9CHg
Malware Config
Signatures
Files
-
b1fcc855dc471e84a37921f79f796fc5f4b7e5f853bfae415daa219daaa13c6c.exe windows x86
fce7809a30096dee5d325be7178490ba
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
ExitProcess
FindResourceA
GetModuleFileNameA
GetThreadContext
GetTickCount
LoadResource
LockResource
ReadProcessMemory
ResumeThread
SetThreadContext
SizeofResource
Sleep
VirtualAlloc
VirtualAllocEx
VirtualFree
WriteProcessMemory
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ccccc Size: 310KB - Virtual size: 310KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ