Static task
static1
Behavioral task
behavioral1
Sample
a7f4793466ab9b502e8e2ff822f4c09d70ad08611682737ca3281eb5c6a4aacb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a7f4793466ab9b502e8e2ff822f4c09d70ad08611682737ca3281eb5c6a4aacb.exe
Resource
win10v2004-20220812-en
General
-
Target
a7f4793466ab9b502e8e2ff822f4c09d70ad08611682737ca3281eb5c6a4aacb
-
Size
76KB
-
MD5
a22130f7f09bdb8cf55cb038bfdac9ba
-
SHA1
7119e664d464fa52acb678ed558c1f265f2635c6
-
SHA256
a7f4793466ab9b502e8e2ff822f4c09d70ad08611682737ca3281eb5c6a4aacb
-
SHA512
d92771bfd6e85014c3ec38599949a7d55e1eb461df843f1108bea90d63c1743e0119eff9596768c87f9847b76b80df8bbb2222933c1d43178362cb8a5d49e60a
-
SSDEEP
1536:+Yx+HCDYdmvqUB3MGovFTHiSmTk9wjyrhuOmpjVrs2ryrd1vUQuq6:+y+iKEBSFfokNrITHs2qo
Malware Config
Signatures
Files
-
a7f4793466ab9b502e8e2ff822f4c09d70ad08611682737ca3281eb5c6a4aacb.exe windows x86
9866c87a2069e5e3f4c26b1fd6f00f3a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ZombifyActCtx
DnsHostnameToComputerNameA
CreateTimerQueue
CreateProcessA
GetConsoleProcessList
VirtualAlloc
SetCalendarInfoW
FreeConsole
FreeUserPhysicalPages
SuspendThread
SwitchToFiber
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.brdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE