Static task
static1
Behavioral task
behavioral1
Sample
f102594dd77a42680d866f17909e79587cfffbea41470ee3d85005a0c2fb4fa1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f102594dd77a42680d866f17909e79587cfffbea41470ee3d85005a0c2fb4fa1.exe
Resource
win10v2004-20220812-en
General
-
Target
f102594dd77a42680d866f17909e79587cfffbea41470ee3d85005a0c2fb4fa1
-
Size
29KB
-
MD5
7aa4961d45cda77bddd1607b81de4eef
-
SHA1
82755998a073dedd3c989867c64341d41a11dd9b
-
SHA256
f102594dd77a42680d866f17909e79587cfffbea41470ee3d85005a0c2fb4fa1
-
SHA512
099ede4cf800ab761f29c0f60fd0f23800d26d3e39db72c306298a30ece65d8ce2db3b266239a48f3349181e8e39b792781efbbb9a42bf73298465d5097f51a8
-
SSDEEP
768:/B98QgDdTFQDZfnv97cbkLuakKTiB5DRyzh:/4QQFQtv97cbknkKTiB5DR
Malware Config
Signatures
Files
-
f102594dd77a42680d866f17909e79587cfffbea41470ee3d85005a0c2fb4fa1.exe windows x86
315396dfdab725c58867abf93515dc3e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleMode
SetConsoleMode
ReadConsoleInputA
GetNumberOfConsoleInputEvents
PeekConsoleInputA
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
FillConsoleOutputCharacterA
FillConsoleOutputAttribute
SetConsoleCursorPosition
CreateFileA
WriteConsoleA
RtlUnwind
HeapCreate
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
HeapValidate
ExitProcess
GetSystemTimeAsFileTime
GetStartupInfoA
GetFileType
GetStdHandle
GetCurrentProcess
DuplicateHandle
SetHandleCount
GetCommandLineA
GetModuleFileNameA
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
SetConsoleCtrlHandler
WriteFile
GetLastError
VirtualAlloc
VirtualQuery
CloseHandle
SetFilePointer
SetStdHandle
DeleteFileA
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE