Static task
static1
Behavioral task
behavioral1
Sample
0bf2d1cf08651968ae9d04f30df986f64b716448e4a3457e0d7e62f4aaa788ef.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0bf2d1cf08651968ae9d04f30df986f64b716448e4a3457e0d7e62f4aaa788ef.exe
Resource
win10v2004-20220812-en
General
-
Target
0bf2d1cf08651968ae9d04f30df986f64b716448e4a3457e0d7e62f4aaa788ef
-
Size
59KB
-
MD5
193e872098609d663e78b1ec8ad33a90
-
SHA1
2f4e3daac5e5ff80d9bfdaadb44baea8507f99c6
-
SHA256
0bf2d1cf08651968ae9d04f30df986f64b716448e4a3457e0d7e62f4aaa788ef
-
SHA512
eca5f78cd4b6b3ebf6ba0e48678afff6515e911322046660c9d4155cb25e209a97d8aa169c0f333655a16a528cf6d7d3e283063dd7870a939b891e2f42d73d40
-
SSDEEP
1536:44FwIrYHHX4WUmjhlA5FOdB8PeVksifylUpZDy6:4PaKHLAfSSPKkYlUbDy
Malware Config
Signatures
Files
-
0bf2d1cf08651968ae9d04f30df986f64b716448e4a3457e0d7e62f4aaa788ef.exe windows x86
c20680c5e89a20d2f324f4d04c65db30
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateMailslotA
SuspendThread
FileTimeToLocalFileTime
lstrcmpiA
GetProcessHeap
GetModuleFileNameA
GetStdHandle
SetLastError
GetVolumePathNameA
lstrcmpiA
HeapCreate
DeleteFileA
GetDriveTypeW
lstrcmpiA
WaitForSingleObject
lstrcmpiA
IsValidLocale
lstrcmpiA
GetLogicalDriveStringsA
GetModuleHandleA
Sleep
lstrlenA
CreateNamedPipeA
scecli
SceSysPrep
SceOpenPolicy
InitializeChangeNotify
DeltaNotify
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.adata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 50KB - Virtual size: 49KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 796B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ