Static task
static1
Behavioral task
behavioral1
Sample
c6386d7bbfe42579f5b0171836711293906fc1a8e0a4e7e55210be0a77623578.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c6386d7bbfe42579f5b0171836711293906fc1a8e0a4e7e55210be0a77623578.exe
Resource
win10v2004-20220812-en
General
-
Target
c6386d7bbfe42579f5b0171836711293906fc1a8e0a4e7e55210be0a77623578
-
Size
15KB
-
MD5
84336af1de908618241fdab3bc8e83c7
-
SHA1
119f16503c03894950507cdddcf5646038660d69
-
SHA256
c6386d7bbfe42579f5b0171836711293906fc1a8e0a4e7e55210be0a77623578
-
SHA512
88038a58ce82ceb534bbf9c46090861205b0c7998720f0908b8f323f65ef2508d44b242c53d8a5322003e93b277363b39f2ad856c05e07e95313ac6ff0c8cf6f
-
SSDEEP
384:HX/CT47n714OpwcIFha+66olLIYWYdCYYaJ1f:HPRlPpwcSMPZtAa7
Malware Config
Signatures
Files
-
c6386d7bbfe42579f5b0171836711293906fc1a8e0a4e7e55210be0a77623578.exe windows x86
99b0126bde51d55b239acc25efcea865
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlUnwind
LocalFree
DeleteCriticalSection
lstrcpyA
HeapAlloc
GetACP
GetOEMCP
InterlockedExchange
GetCommandLineW
SetConsoleCP
GetModuleHandleA
VirtualProtect
SetStdHandle
TlsAlloc
GetStdHandle
GetStartupInfoA
ExitProcess
user32
SetCursor
PeekMessageA
GetNextDlgTabItem
rpcrt4
I_RpcBCacheFree
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 640B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 55KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE