Static task
static1
Behavioral task
behavioral1
Sample
ad148d5fa13e5b12fa2dec6ad443be268706f894916e44bdaf494c045b8aa3ad.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ad148d5fa13e5b12fa2dec6ad443be268706f894916e44bdaf494c045b8aa3ad.exe
Resource
win10v2004-20220812-en
General
-
Target
ad148d5fa13e5b12fa2dec6ad443be268706f894916e44bdaf494c045b8aa3ad
-
Size
71KB
-
MD5
67c0ef173c6150f3868e46358e145df2
-
SHA1
f701768ac80159ca185ae345ee944c1aa88e59a7
-
SHA256
ad148d5fa13e5b12fa2dec6ad443be268706f894916e44bdaf494c045b8aa3ad
-
SHA512
b74d646a00cec66da5f325f014d92d1ec4c8c16de53893eef800969d0266853729c1f57cbca7cb58a4776148df86615193046767fdc9b488c512f282fc58f366
-
SSDEEP
1536:+wkH4t23alr7S/8xH7/M9qPe6C38pmWcWqXZmIDl:1kfWn7VWqm6WqqXcIDl
Malware Config
Signatures
Files
-
ad148d5fa13e5b12fa2dec6ad443be268706f894916e44bdaf494c045b8aa3ad.exe windows x86
d3eadb880a88da4a36611806cbc1c369
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeW
TransactNamedPipe
lstrcpynA
IsBadHugeWritePtr
CreateProcessW
Heap32Next
GetLocaleInfoA
SetUnhandledExceptionFilter
SetComputerNameA
HeapCreateTagsW
CancelTimerQueueTimer
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 56KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE