Static task
static1
Behavioral task
behavioral1
Sample
b5a1b57f7a7b08ea934b2bf6364f3e29bb4e156270ab52aa7cea3a685416fc61.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b5a1b57f7a7b08ea934b2bf6364f3e29bb4e156270ab52aa7cea3a685416fc61.exe
Resource
win10v2004-20221111-en
General
-
Target
b5a1b57f7a7b08ea934b2bf6364f3e29bb4e156270ab52aa7cea3a685416fc61
-
Size
4.7MB
-
MD5
5bdd698def27aa909b0ab2aeacc064e1
-
SHA1
cc1b68f8d07c69b1241d5db0fdcd275312ea011d
-
SHA256
b5a1b57f7a7b08ea934b2bf6364f3e29bb4e156270ab52aa7cea3a685416fc61
-
SHA512
d7691fcc4fd5020c33a2e9615d2f3cdec93bed90c210ca0183a0e5977642bc93a5c8bbe818953c0dcc0dd471002db61ad81e4010014fe98e7475082011bb2f4c
-
SSDEEP
98304:ieMuSQhJIzQHlAKN+KtRLVpe+v44gN8WxMKDGq0mx0G:ilOIzGh4oZu8iMuGqj3
Malware Config
Signatures
Files
-
b5a1b57f7a7b08ea934b2bf6364f3e29bb4e156270ab52aa7cea3a685416fc61.exe windows x86
2d82a442db27b2fe89bffae1664098d1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryA
SetEnvironmentVariableA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetDriveTypeA
FlushFileBuffers
EnterCriticalSection
GetTickCount
CloseHandle
WriteFile
CreateFileA
GetTempPathA
GetModuleFileNameA
ReadFile
GetFileSize
GetProcAddress
LoadLibraryA
GetModuleHandleA
GetStartupInfoA
msvcrt
sprintf
memset
strrchr
strcpy
strchr
strlen
??2@YAPAXI@Z
__CxxFrameHandler
strcmp
malloc
free
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
memcpy
??3@YAXPAX@Z
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 712B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.6MB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ