Static task
static1
Behavioral task
behavioral1
Sample
82c38dba5d3dff21beb3045d749b20e1e0881a8a3daffc89eddd781c5f168c49.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
82c38dba5d3dff21beb3045d749b20e1e0881a8a3daffc89eddd781c5f168c49.exe
Resource
win10v2004-20220812-en
General
-
Target
82c38dba5d3dff21beb3045d749b20e1e0881a8a3daffc89eddd781c5f168c49
-
Size
77KB
-
MD5
0db2188cc25be7fa0395165f5c55020c
-
SHA1
321f703bbf5ea5b1c51655e6c763daae0a45fac9
-
SHA256
82c38dba5d3dff21beb3045d749b20e1e0881a8a3daffc89eddd781c5f168c49
-
SHA512
b3b353376cf0d0edd95ff1671bdd0151c1f4757be063ae489c28fc3dc584f2d7bb47f2058de0170d89130a8fa0bf20df9186141485e50747440da8bf87084e83
-
SSDEEP
1536:qsrj2oegltCUenl1Us64G+I3eJaFBtw7FulnldgHcX/aSBZn+VEL0:qsHwgSEz+sMULldgHP8Em0
Malware Config
Signatures
Files
-
82c38dba5d3dff21beb3045d749b20e1e0881a8a3daffc89eddd781c5f168c49.exe windows x86
a16c450944ed22d995969d249923cef8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetHandleCount
GetStringTypeW
GetCurrentThread
GetModuleHandleA
InterlockedDecrement
GetConsoleOutputCP
GetExitCodeProcess
VirtualProtect
CreateProcessA
GetSystemInfo
MulDiv
VirtualQuery
GetThreadLocale
DeleteFileA
RtlMoveMemory
IsDebuggerPresent
FileTimeToSystemTime
GetFileAttributesA
SetErrorMode
SizeofResource
GetProcAddress
GetTempPathA
GetDriveTypeA
IsBadWritePtr
GetCurrentProcessId
lstrlenA
FileTimeToDosDateTime
LoadResource
IsValidCodePage
FreeEnvironmentStringsA
GetSystemTime
msvcrt
__p___initenv
__p__fmode
__p__commode
_adjust_fdiv
_except_handler3
__set_app_type
_XcptFilter
__getmainargs
_controlfp
_initterm
_exit
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ