Static task
static1
Behavioral task
behavioral1
Sample
5e1c6a004a825f41798d95d938622f8d024933a1974f1da011582267f817a00a.exe
Resource
win7-20220812-en
General
-
Target
5e1c6a004a825f41798d95d938622f8d024933a1974f1da011582267f817a00a
-
Size
120KB
-
MD5
5736d8414208896161767596e9d07040
-
SHA1
55900ac1b72b1aa93b59d7650b73df772038605b
-
SHA256
5e1c6a004a825f41798d95d938622f8d024933a1974f1da011582267f817a00a
-
SHA512
7cd5ddc9cb1674a238c831a4611fd2a45c25f818b18f5fc0c97c89db15052d1eaa98ec00d173e14a64eee5638d44fe8652d980467e37c1ea1beb2eb54779444f
-
SSDEEP
3072:CE1V/WfrHpZQ79CUIIrka30/EnpyM2x7IpJo:pv/srHwuIrYx7Ino
Malware Config
Signatures
Files
-
5e1c6a004a825f41798d95d938622f8d024933a1974f1da011582267f817a00a.exe windows x86
728aa2ec65ef905d4ee963ea4eb30249
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Heap32First
VirtualAllocEx
ExitProcess
GetStringTypeW
GetLongPathNameA
WaitForSingleObject
LoadLibraryA
GetDiskFreeSpaceW
lstrcmpA
FindResourceW
GetPrivateProfileIntA
GetACP
GetDiskFreeSpaceW
GetExitCodeProcess
InterlockedIncrement
GetPrivateProfileIntA
GetModuleHandleW
WriteFileEx
GetCurrentDirectoryA
lstrcpyW
SetEnvironmentVariableA
GetPrivateProfileSectionA
InterlockedDecrement
apphelp
ApphelpCheckExe
ApphelpCheckIME
AllowPermLayer
SdbCreateMsiTransformFile
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dbg Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE