Static task
static1
Behavioral task
behavioral1
Sample
92bedc55375d5410d8e6a2e2a5c70b4c30fbb3348e898f48e9df23c1a841138a.exe
Resource
win7-20220812-en
General
-
Target
92bedc55375d5410d8e6a2e2a5c70b4c30fbb3348e898f48e9df23c1a841138a
-
Size
120KB
-
MD5
12d74917064fca60aeebce96b1ce7260
-
SHA1
c115658060b4fd05a4312cdbf043f99314bb60b3
-
SHA256
92bedc55375d5410d8e6a2e2a5c70b4c30fbb3348e898f48e9df23c1a841138a
-
SHA512
4910e931c2e5aa8e0eb7b753c37c35482c594b4398d3696fd3389fe670820eb15d8d2774caade701a12287df7684abf48ce90134cb2c51ad73e9f30f8642be55
-
SSDEEP
3072:W9CHWajWgtRhLe3Wvsmk8t35sCY1Fa874Ppqm:6CNhLeikm6CYL7sM
Malware Config
Signatures
Files
-
92bedc55375d5410d8e6a2e2a5c70b4c30fbb3348e898f48e9df23c1a841138a.exe windows x86
c4084a46f9dc09e8bd2f05b8d9a8fc2f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
VirtualAlloc
GetModuleHandleW
Sleep
GetLongPathNameA
SetEnvironmentVariableA
GetLogicalDrives
GetExitCodeProcess
GetDiskFreeSpaceW
GetDiskFreeSpaceW
LoadLibraryA
lstrcpyW
FindResourceW
Heap32First
lstrcmpA
InterlockedIncrement
WaitForSingleObject
ReadFileEx
GetStringTypeW
InterlockedDecrement
GetPrivateProfileIntA
GetCurrentDirectoryA
apphelp
AllowPermLayer
ApphelpCheckExe
SdbCreateMsiTransformFile
ApphelpCheckIME
clbcatq
SetSetupSave
ComPlusMigrate
SetSetupSave
ComPlusMigrate
SetupOpen
CheckMemoryGates
ComPlusMigrate
SetupOpen
CheckMemoryGates
CheckMemoryGates
DllGetClassObject
DllGetClassObject
SetupOpen
version
VerFindFileA
Sections
.text Size: 1024B - Virtual size: 880B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE