Static task
static1
Behavioral task
behavioral1
Sample
d448db13575cd844b099f3489427d02b3ff002bb077db0230bdaed4bc2bd2792.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d448db13575cd844b099f3489427d02b3ff002bb077db0230bdaed4bc2bd2792.exe
Resource
win10v2004-20220812-en
General
-
Target
d448db13575cd844b099f3489427d02b3ff002bb077db0230bdaed4bc2bd2792
-
Size
60KB
-
MD5
f1efc857329aff32e2b85238f8f44b97
-
SHA1
49e2e3d2fccf5dbb5dd3081552fcc2a6e5836b80
-
SHA256
d448db13575cd844b099f3489427d02b3ff002bb077db0230bdaed4bc2bd2792
-
SHA512
270fa2e878bbf005cd514e6e5f38faf96eb49553822456ed4f845f0ca5a04b16c0144a22d140d91a4160e484728729ddc8b96bd4468559d26c0e9543c3a96116
-
SSDEEP
768:8PGZdtlqUcTAocVPD+MBXymaegqMflD3F6Ek5kfbtcWFlEp/:WkncTlY+MB/aegVlDAlGfbFlER
Malware Config
Signatures
Files
-
d448db13575cd844b099f3489427d02b3ff002bb077db0230bdaed4bc2bd2792.exe windows x86
b76d9561ec9fc8c33106c9f7709c9b28
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
CloseHandle
WriteFile
ReadFile
CreateFileA
SetEnvironmentVariableA
GetEnvironmentVariableA
RemoveDirectoryA
SetFilePointer
GetModuleFileNameA
DeleteFileA
SetFileAttributesA
GetFileSize
GetSystemTime
GetTempPathA
CreateDirectoryA
SetStdHandle
GetSystemInfo
VirtualProtect
ExitProcess
RaiseException
RtlUnwind
GetSystemTimeAsFileTime
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapAlloc
GetACP
GetOEMCP
GetCPInfo
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
HeapFree
SetUnhandledExceptionFilter
GetProcAddress
TerminateProcess
GetCurrentProcess
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
HeapSize
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
LoadLibraryA
InterlockedExchange
VirtualQuery
IsBadReadPtr
IsBadCodePtr
GetLocaleInfoA
FlushFileBuffers
shell32
ShellExecuteExA
shlwapi
PathFileExistsA
Sections
.avx���� Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE