Static task
static1
Behavioral task
behavioral1
Sample
962d0918d577589b63939258a4cb477fcb7d2d602ae7517a8b363eb253e58f92.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
962d0918d577589b63939258a4cb477fcb7d2d602ae7517a8b363eb253e58f92.exe
Resource
win10v2004-20221111-en
General
-
Target
962d0918d577589b63939258a4cb477fcb7d2d602ae7517a8b363eb253e58f92
-
Size
128KB
-
MD5
e4dd1936709a1dd6607bf73357644413
-
SHA1
15d31d9a36dcb6042c38c9daa19fa9da8ef6537e
-
SHA256
962d0918d577589b63939258a4cb477fcb7d2d602ae7517a8b363eb253e58f92
-
SHA512
b01a9d25cd7308c193dec6afb492fad3a8fe9238afe38d618a223935ea62a0ec6baae393be5ad6648f665d3355501cdc727081a3f286d974f9aaf90816ef9cdd
-
SSDEEP
3072:fBSRjs/ilGuIGiOMw6CGij53HclBAbCvimahl0cfnwYI:fsRg/ilaGiOVDR+Brvhq0kwb
Malware Config
Signatures
Files
-
962d0918d577589b63939258a4cb477fcb7d2d602ae7517a8b363eb253e58f92.exe windows x86
74867cddba18b90fee87d223e4c1b3c8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibrary
GetProcAddress
LoadLibraryA
GetWindowsDirectoryA
ExitProcess
CloseHandle
lstrlenA
SetFileTime
LoadResource
lstrcpyA
lstrcmpiA
SetLastError
GetLastError
lstrcatA
ReadFile
SetFilePointer
CreateFileA
GetModuleFileNameA
Process32First
CreateToolhelp32Snapshot
GetCurrentThreadId
Process32Next
GetModuleHandleA
SetUnhandledExceptionFilter
ReleaseMutex
CreateMutexA
GetCommandLineA
SetFileAttributesA
CreateDirectoryA
GetSystemDirectoryA
Sleep
CreateThread
RaiseException
InterlockedExchange
LocalAlloc
GetStartupInfoA
msvcrt
strchr
realloc
malloc
strlen
__CxxFrameHandler
_CxxThrowException
_except_handler3
??3@YAXPAX@Z
strstr
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
memcpy
??2@YAPAXI@Z
memset
strtok
sprintf
_strrev
Sections
PAGE Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
����� Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
����� Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
����� Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
����� Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
����� Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
����� Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
����� Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
����� Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE