Static task
static1
Behavioral task
behavioral1
Sample
a1c6db26f5d66e9bedbb62b3bd112123dce4c2e8b3e4b89b64e03812cf9a5a93.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a1c6db26f5d66e9bedbb62b3bd112123dce4c2e8b3e4b89b64e03812cf9a5a93.exe
Resource
win10v2004-20221111-en
General
-
Target
a1c6db26f5d66e9bedbb62b3bd112123dce4c2e8b3e4b89b64e03812cf9a5a93
-
Size
128KB
-
MD5
7b9809810f917fbccc7fb34c72ca0c22
-
SHA1
4c8ff509c3c8803855c6e77596987b55197728c3
-
SHA256
a1c6db26f5d66e9bedbb62b3bd112123dce4c2e8b3e4b89b64e03812cf9a5a93
-
SHA512
19221e48a2e6f6c7d87c893fe148a2594ae8ae034e3d65aa2bfd496415a189b16bae8b53a77905dc36c13c6b087b2cf0814819cdfc3df717ef991eb9b70b8f8a
-
SSDEEP
3072:CtLKIZU8I+qiPqqY6C0DVcPMzv6uzkKU:pwrN7/VcEW0kKU
Malware Config
Signatures
Files
-
a1c6db26f5d66e9bedbb62b3bd112123dce4c2e8b3e4b89b64e03812cf9a5a93.exe windows x86
b862aa2a3ba11fe202fbd5b134a1d3c1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
CreateTimerQueue
lstrlen
Toolhelp32ReadProcessMemory
WriteFileGather
lstrcmpiA
QueueUserAPC
MoveFileExA
ExitProcess
GetStartupInfoA
Sections
CODE Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
WEIJUNLI Size: - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 904B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA