Static task
static1
Behavioral task
behavioral1
Sample
c66a642c077f560fb40bc13a4571963cc57bce93a65edf32aec1eb1727002508.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c66a642c077f560fb40bc13a4571963cc57bce93a65edf32aec1eb1727002508.exe
Resource
win10v2004-20221111-en
General
-
Target
c66a642c077f560fb40bc13a4571963cc57bce93a65edf32aec1eb1727002508
-
Size
125KB
-
MD5
febe87565a77f76b68394acf028ba31b
-
SHA1
ceb1cc5e6f5595baeca1ced7fe3f646d578f37ba
-
SHA256
c66a642c077f560fb40bc13a4571963cc57bce93a65edf32aec1eb1727002508
-
SHA512
331796ca0b88f178d1fe72cd5ce886b4d7ca910811032334ed7ab97daaa973623599dfab40b15571ca06c19166a0023b86c3bf23fc981fc9304a65ce9d19db56
-
SSDEEP
3072:9jIuZoQoo2I497iBJeWIJvF/mPVGWNQ2wII+P3X1UZ:L7f4I8Vg9GW22xIS3X
Malware Config
Signatures
Files
-
c66a642c077f560fb40bc13a4571963cc57bce93a65edf32aec1eb1727002508.exe windows x86
749af71336f6b93c914698d958983277
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocalTime
GetModuleHandleW
GetProcAddress
CreateFileMappingA
GetSystemDefaultLCID
CopyFileA
GetModuleFileNameW
SetThreadLocale
IsBadCodePtr
GetCurrentProcessId
LCMapStringW
GetCommandLineW
GetStartupInfoW
FreeEnvironmentStringsA
VirtualProtectEx
EnumCalendarInfoA
GetStringTypeExA
GetProcessHeap
VirtualProtect
msvcrt
_XcptFilter
_controlfp
__p__commode
__setusermatherr
calloc
__set_app_type
__p__fmode
__p___initenv
free
_adjust_fdiv
_exit
__getmainargs
_initterm
_except_handler3
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 27KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE