Static task
static1
Behavioral task
behavioral1
Sample
f2616f32a483a81c66340d57bafe1bf73ff4d1d6583544f25419905d6b473ba7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f2616f32a483a81c66340d57bafe1bf73ff4d1d6583544f25419905d6b473ba7.exe
Resource
win10v2004-20220812-en
General
-
Target
f2616f32a483a81c66340d57bafe1bf73ff4d1d6583544f25419905d6b473ba7
-
Size
112KB
-
MD5
e64212d1c070dced891c0fc8aaf33b1d
-
SHA1
53f4ea452f4f2cc04f24ec9d6cbaf76fb972cd04
-
SHA256
f2616f32a483a81c66340d57bafe1bf73ff4d1d6583544f25419905d6b473ba7
-
SHA512
c52b21000d381683825b6d7dc629f835d4993fa4b93a1a3f56db7206b74bf745f4c6ecb3fa92cf4766b86d34a34d555946145d7b5b22fa453e14180c70293f4c
-
SSDEEP
3072:ONHRo4FmXa4slB5Jxht5pD++4YVqQpeh5yDdV0:O1RTFmXa4wB5XDlVLkSpV0
Malware Config
Signatures
Files
-
f2616f32a483a81c66340d57bafe1bf73ff4d1d6583544f25419905d6b473ba7.exe windows x86
fde29a88ff8bd33260730ad3942de78f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
GetSystemTimeAsFileTime
msvcr80
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_crt_debugger_hook
_adjust_fdiv
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
atoi
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ