Static task
static1
Behavioral task
behavioral1
Sample
14b7112b0e1fe672de33f758e2003ca2731a4844b6607054a9f4896507a52049.exe
Resource
win7-20221111-en
General
-
Target
14b7112b0e1fe672de33f758e2003ca2731a4844b6607054a9f4896507a52049
-
Size
120KB
-
MD5
0cd360721d7d1e13b784e56a815e30c0
-
SHA1
8cd1c195c506a85f81677443832e32cbd9ccbc5f
-
SHA256
14b7112b0e1fe672de33f758e2003ca2731a4844b6607054a9f4896507a52049
-
SHA512
4fcaa504f054b2e7c0eac47c569ef5acde0f5f794dcf86f41135eaec5d7266df7e0ad100e986f6da0586d907dd3ffc47963282254080a08226ccf822ec3335db
-
SSDEEP
3072:MJhOXWdBOmaTDqW/KpazY028VK9DXxFo:MJhqEKKpaI8VK9b4
Malware Config
Signatures
Files
-
14b7112b0e1fe672de33f758e2003ca2731a4844b6607054a9f4896507a52049.exe windows x86
1305106a054ca2e2a11b5bb0948670fc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenW
GetNumberFormatA
lstrcpyW
GetLocaleInfoW
FindNextVolumeW
SetConsoleTitleA
TlsAlloc
GetStartupInfoW
lstrcpyW
TlsAlloc
CreateEventA
GetPrivateProfileIntA
lstrcpyW
GetModuleHandleA
lstrcpyW
GetModuleFileNameW
SetCurrentDirectoryA
GetFullPathNameA
lstrcpyW
DeleteFileA
VirtualAlloc
TlsGetValue
GetCurrentProcess
untfs
Chkdsk
FormatEx
??0NTFS_BOOT_FILE@@QAE@XZ
Format
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ORPC Size: 1024B - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.RDATA Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Edata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ