Static task
static1
Behavioral task
behavioral1
Sample
a90ae4a46486564c327d9cf00b73487024cc99d3a25ca06b84ff788d40dd52c7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a90ae4a46486564c327d9cf00b73487024cc99d3a25ca06b84ff788d40dd52c7.exe
Resource
win10v2004-20220812-en
General
-
Target
a90ae4a46486564c327d9cf00b73487024cc99d3a25ca06b84ff788d40dd52c7
-
Size
77KB
-
MD5
0dbebd38bbbad81aa8f967b3a2118ad3
-
SHA1
9d06f3febf983fafd45415cda3f1f4196a4627a4
-
SHA256
a90ae4a46486564c327d9cf00b73487024cc99d3a25ca06b84ff788d40dd52c7
-
SHA512
2858b9c1ed36645f56a1419507621e3528d5e8262e942e3c5e65b0d03061163bc4c0a9f763b34d496155669bb527f147375dd9f4b5c7e320c30a1aec19a1f0d0
-
SSDEEP
1536:q8bjs2XgzcGwiOCgD/vwwapKOkLJe7v1K2T:qUsqGtWYsJe79dT
Malware Config
Signatures
Files
-
a90ae4a46486564c327d9cf00b73487024cc99d3a25ca06b84ff788d40dd52c7.exe windows x86
d8de6a76d2a038dadcbe2cdd800d7f05
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedIncrement
lstrcmpiW
LoadResource
GetPrivateProfileStringA
FreeEnvironmentStringsW
GetExitCodeProcess
VirtualProtect
GetFileType
GetCommandLineW
GetModuleHandleA
DeleteFileA
GetProcAddress
SetFilePointer
SizeofResource
RtlMoveMemory
LocalAlloc
WaitForSingleObject
GetLastError
GetTempPathA
GetThreadLocale
GetCurrentThread
OutputDebugStringA
SetEnvironmentVariableA
WriteConsoleA
msvcrt
_XcptFilter
__p__fmode
__p___initenv
_initterm
_exit
__set_app_type
_adjust_fdiv
_except_handler3
__p__commode
__getmainargs
_controlfp
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 1022B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ