Static task
static1
Behavioral task
behavioral1
Sample
ad4f55379dc503953213564cc3fd9de2eb65325cce0015717c5ca0fcf1c3aa4a.exe
Resource
win7-20220901-en
General
-
Target
ad4f55379dc503953213564cc3fd9de2eb65325cce0015717c5ca0fcf1c3aa4a
-
Size
234KB
-
MD5
7caecdc0e6fc5feaa9b6c8f799daaaa9
-
SHA1
699883b31670d8ddc3399bfec84509aa5b477964
-
SHA256
ad4f55379dc503953213564cc3fd9de2eb65325cce0015717c5ca0fcf1c3aa4a
-
SHA512
af77cbfc88be0faf968dbbc11b771b027e7cec6ccd59705728a257ef4cb93c0f7681848f551c7e1de964d1c90ccdc5cf281f961522142312a99e749719f978c6
-
SSDEEP
6144:kebSzr0gNIxQBIPs6DrEZ+sQzhS9JUXG/Pq:VU/axaUHps8huJwG/Pq
Malware Config
Signatures
Files
-
ad4f55379dc503953213564cc3fd9de2eb65325cce0015717c5ca0fcf1c3aa4a.exe windows x86
b3557dffa6d810f6a9d28e0300f50338
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
GetExitCodeProcess
GetDriveTypeA
GetSystemDirectoryA
GetCurrentDirectoryA
CloseHandle
GetDiskFreeSpaceA
WaitForSingleObject
CreateEventA
GetFileAttributesA
GetCommandLineA
GetModuleFileNameA
GetProcessHeap
CreateFileA
SetFileTime
CreateThread
LocalFileTimeToFileTime
CreateDirectoryA
HeapAlloc
HeapFree
SetFilePointer
ReadFile
WriteFile
ExitProcess
GetLastError
RemoveDirectoryA
DeleteFileA
TerminateProcess
SetEvent
SetEnvironmentVariableA
GetEnvironmentVariableA
WideCharToMultiByte
DosDateTimeToFileTime
FormatMessageA
user32
EndDialog
SendDlgItemMessageA
LoadStringA
DialogBoxParamA
ShowWindow
SendMessageA
MessageBoxA
comctl32
ord17
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
ntdll
strstr
_allmul
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zero Size: - Virtual size: 66KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 208KB - Virtual size: 212KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE