Static task
static1
Behavioral task
behavioral1
Sample
9db5478967a2ca9190ac2f24e73d75191495695c13ce91813771c2cceb08a232.exe
Resource
win7-20221111-en
General
-
Target
9db5478967a2ca9190ac2f24e73d75191495695c13ce91813771c2cceb08a232
-
Size
385KB
-
MD5
180c82ef1e7bd918f1b5405f54c85b31
-
SHA1
c2809fb0c84b86ffcd0ba80da02887027d8f388e
-
SHA256
9db5478967a2ca9190ac2f24e73d75191495695c13ce91813771c2cceb08a232
-
SHA512
6d2af546bb781b823233954bec21d8d534879ecade99477727de3975a9b36474d8fe0d2009abc85b80dafcf687e5507da8e75bddcc653d447f702a0d2c42e314
-
SSDEEP
6144:l4IsOqmIOChGB3OEoo2BRxbsFQOHNdr5T+p0WAZb4avsg2Ep/mMTO4:WIsPOh1ojOWsd4p0J9Zsg2EpuMTO
Malware Config
Signatures
Files
-
9db5478967a2ca9190ac2f24e73d75191495695c13ce91813771c2cceb08a232.exe windows x86
92ac6a418206f9cdcfc77ad718e018d3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
crtdll
memset
strlen
strcpy
strcat
memcpy
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
InitializeCriticalSection
GetCurrentProcess
DuplicateHandle
CloseHandle
CreatePipe
GetStdHandle
HeapAlloc
CreateProcessA
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
HeapFree
Sleep
DeleteFileA
WriteFile
CreateFileA
HeapReAlloc
shell32
ShellExecuteExA
Sections
.code Size: 1024B - Virtual size: 543B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 377KB - Virtual size: 377KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 696B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.flat Size: 512B - Virtual size: 7B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE