Static task
static1
Behavioral task
behavioral1
Sample
d256cf422fa042cb74a2e3f6ccd85221ef790c4896068ceaae565bb090e0ed93.exe
Resource
win7-20221111-en
General
-
Target
d256cf422fa042cb74a2e3f6ccd85221ef790c4896068ceaae565bb090e0ed93
-
Size
121KB
-
MD5
29f5c73ec03e095f875f5dda174de790
-
SHA1
0b87689d438cc0a4efc91e379b954046feaddb9f
-
SHA256
d256cf422fa042cb74a2e3f6ccd85221ef790c4896068ceaae565bb090e0ed93
-
SHA512
19dd66e0492cb71293230e8ed2afe32173cc4f2868d7d555a8b8d97e21affd2598368fd303f5681f9d81780d438e7aa505f0b1c47d43edd64e6b817cbd474bc0
-
SSDEEP
3072:oWBSBk12Qmw+3ygLZhdNhvjqQ2Jb7pjYz8GZz:3B6ZMwZhdPvJ2lljYz8Oz
Malware Config
Signatures
Files
-
d256cf422fa042cb74a2e3f6ccd85221ef790c4896068ceaae565bb090e0ed93.exe windows x86
d9a858febef1748df45069df1c5a11b3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDiskFreeSpaceW
GetModuleHandleW
SetEnvironmentVariableA
GetDiskFreeSpaceW
FindResourceW
GetPrivateProfileSectionA
WaitForSingleObject
GetCurrentDirectoryA
Heap32First
lstrcpyW
lstrcmpA
GetPrivateProfileIntA
InterlockedDecrement
LoadLibraryA
ExitProcess
GetACP
WriteFileEx
GetExitCodeProcess
VirtualAllocEx
GetStringTypeW
InterlockedIncrement
GetPrivateProfileIntA
GetLongPathNameA
apphelp
ApphelpCheckExe
AllowPermLayer
SdbCreateMsiTransformFile
ApphelpCheckIME
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dbg Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE