Static task
static1
Behavioral task
behavioral1
Sample
93aa7e287b697f0fe6d97d0b180b2b5c434a74a46d81d9d71a83b115ad5380f5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
93aa7e287b697f0fe6d97d0b180b2b5c434a74a46d81d9d71a83b115ad5380f5.exe
Resource
win10v2004-20220812-en
General
-
Target
93aa7e287b697f0fe6d97d0b180b2b5c434a74a46d81d9d71a83b115ad5380f5
-
Size
88KB
-
MD5
0adf9142120ce5caa6a050caa3d2d4eb
-
SHA1
7dd809fe7357d221e4e6e7f5f1c5772b4458fa72
-
SHA256
93aa7e287b697f0fe6d97d0b180b2b5c434a74a46d81d9d71a83b115ad5380f5
-
SHA512
5f62478f575fae36ad5ee40c857ee936889b74462be291b91ed5eda42c18d1784ca5e501af18a947ae1881d18b39b40d73a0125f613235a32bef59ff8975b0d0
-
SSDEEP
1536:bzG+lUFl01sLz35oXXpPmBwgPHapDUu9FjRt55T:bzGWUFK143SXW9PHr+FjRFT
Malware Config
Signatures
Files
-
93aa7e287b697f0fe6d97d0b180b2b5c434a74a46d81d9d71a83b115ad5380f5.exe windows x86
08b49ab95b2051256cd4716aadb1ab93
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumResourceTypesA
IsBadReadPtr
DeleteCriticalSection
GetComputerNameA
VirtualProtect
ReleaseMutex
GetLastError
IsBadCodePtr
LoadLibraryExA
GetCommandLineA
GetDiskFreeSpaceExW
FindClose
SetLastError
CloseHandle
TlsGetValue
GetTickCount
GetModuleHandleA
GetDriveTypeA
FreeConsole
Sleep
shell32
SHGetSettings
ExtractIconA
SHGetDiskFreeSpaceA
SHFree
DragFinish
SHGetMalloc
DragAcceptFiles
DragQueryFileA
DuplicateIcon
StrChrA
ShellMessageBoxA
ShellAboutA
DllUnregisterServer
printui
vQueueCreate
bPrinterSetup
bFolderGetPrinter
PnPInterface
vPrinterPropPages
advapi32
RegCloseKey
Sections
.text Size: 1024B - Virtual size: 580B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 82KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE