Static task
static1
Behavioral task
behavioral1
Sample
1e838505d22fe4b5fc3d9c7e56b06fee88f59479fb0461cae202aa4211a683cc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1e838505d22fe4b5fc3d9c7e56b06fee88f59479fb0461cae202aa4211a683cc.exe
Resource
win10v2004-20220812-en
General
-
Target
1e838505d22fe4b5fc3d9c7e56b06fee88f59479fb0461cae202aa4211a683cc
-
Size
80KB
-
MD5
0ff5ef18a7bdd2e96e548925ad5e7720
-
SHA1
aa385e5321b23c6930f2281a9ac0f9b93631fa98
-
SHA256
1e838505d22fe4b5fc3d9c7e56b06fee88f59479fb0461cae202aa4211a683cc
-
SHA512
cfb33d1ce65f390070da8f179e283150e6e57bd24b7eb30c136183f09f2ea43a95ac1c143044131e2d1a5526c982da53019b27ea31b1172684cd7e732fb3d56c
-
SSDEEP
1536:NNNQBbH+EkFU5pT0bNkp7Vgjnqym4cbNA04RaAWj6wpUz:NNnEKUrgb2p7VgjqypcRA0eaA8gz
Malware Config
Signatures
Files
-
1e838505d22fe4b5fc3d9c7e56b06fee88f59479fb0461cae202aa4211a683cc.exe windows x86
b3ebe50c05d2243cce7bcd2addf4c91b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteConsoleOutputCharacterA
IsDebuggerPresent
SetThreadIdealProcessor
FindResourceExA
VirtualAlloc
CreateFileMappingA
GetPriorityClass
GetComputerNameA
GetLastError
GetProcessId
GetLogicalDriveStringsA
UnregisterWait
DeviceIoControl
GetProfileIntA
CreateDirectoryExA
GetProcessWorkingSetSize
LoadLibraryExA
ResumeThread
CreateNamedPipeA
RtlMoveMemory
WaitNamedPipeA
GetVersionExA
WriteProfileSectionA
advapi32
CredFree
CredMarshalCredentialW
dpmodemx
SPInit
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 49KB - Virtual size: 292KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE