Static task
static1
Behavioral task
behavioral1
Sample
a98f340d190eb2fb42e270a621a12749223ff775c82369ab9670c0f62cd5239b.exe
Resource
win7-20221111-en
General
-
Target
a98f340d190eb2fb42e270a621a12749223ff775c82369ab9670c0f62cd5239b
-
Size
119KB
-
MD5
46cffb2e0fdebf8d33262e7104a334f0
-
SHA1
38c4adaed2b8d8c9d21152e4f7cc1e704e405622
-
SHA256
a98f340d190eb2fb42e270a621a12749223ff775c82369ab9670c0f62cd5239b
-
SHA512
95f8b1b49f7439cf4c2484e4b30d031573cf3780eb74f0f90788eba3467075be39fa699d4d7304f5601b0685ba2130338174305f8a1d486657b1ca9b72a4a723
-
SSDEEP
1536:BhTYCcfLWZYjMfvmWBo5pV5Re6SyGa9C9JenRXX6YmPvLycBFT7niQ/I23+1h:BzCj1WBQV3nbU/AYpTyRn
Malware Config
Signatures
Files
-
a98f340d190eb2fb42e270a621a12749223ff775c82369ab9670c0f62cd5239b.exe windows x86
75913b026b8879eefb43a5293f79090c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLongPathNameA
lstrcpyW
GetModuleHandleW
GetPrivateProfileSectionA
SetEnvironmentVariableA
GetCurrentDirectoryA
FindResourceW
Heap32First
GetPrivateProfileIntA
GetDiskFreeSpaceW
LoadLibraryA
GetACP
VirtualAllocEx
ExitProcess
GetExitCodeProcess
GetStringTypeW
WaitForSingleObject
lstrcmpA
ReadFileEx
InterlockedIncrement
GetPrivateProfileIntA
InterlockedDecrement
GetDiskFreeSpaceW
apphelp
ApphelpCheckExe
SdbCreateMsiTransformFile
AllowPermLayer
ApphelpCheckIME
shell32
DllUnregisterServer
DragFinish
StrChrA
ExtractIconA
DuplicateIcon
SHGetSettings
DragAcceptFiles
DragQueryFileA
ShellAboutA
ShellMessageBoxA
SHGetMalloc
SHGetDiskFreeSpaceA
SHFree
dbghelp
ImageRvaToVa
Sections
.text Size: 1024B - Virtual size: 928B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dbg Size: 115KB - Virtual size: 115KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE