Static task
static1
Behavioral task
behavioral1
Sample
b28019af2f6cb914b414523cc696583f.exe
Resource
win7-20221111-en
General
-
Target
b28019af2f6cb914b414523cc696583f.exe
-
Size
120KB
-
MD5
b28019af2f6cb914b414523cc696583f
-
SHA1
106c78ac3485748a9351db568734d7550716e75c
-
SHA256
135ececcad2ea6f930d8df8c44b3059bd2c852b203a4bcb0c6f9a9f1a993f3fd
-
SHA512
5ae6694d2a91e9b10946bef8c688b840cef5bd5f62efd4fc8057e8d745aa598aeb259b645ed9abf0f26410832c989de01ad994cb4ebe5b9a001b1d2f98ad716b
-
SSDEEP
3072:1FClXHW191YQU0wRT+hV6zzV1+dGu58Fi9P:1FClXI96QUzh+W/DQN9
Malware Config
Signatures
Files
-
b28019af2f6cb914b414523cc696583f.exe.exe windows x86
47a5f5b03e14ad8fe66081f8fda14df3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindNextVolumeW
IsBadStringPtrW
SetConsoleTitleA
lstrcpyW
GetPrivateProfileIntA
lstrlenW
GetFullPathNameA
lstrcpyW
GetNumberFormatA
SetStdHandle
TlsAlloc
lstrcpyW
GetStartupInfoW
VirtualAlloc
lstrcpyW
lstrcpyW
DeleteFileA
GetModuleFileNameW
CreateEventA
GetModuleHandleA
SetCurrentDirectoryA
GetLocaleInfoA
GetCurrentProcess
untfs
ChkdskEx
Recover
Extend
Format
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.orpc Size: 1KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.RDATA Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.EDATA Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ