Static task
static1
Behavioral task
behavioral1
Sample
7b6db403d960509e257c82a4c5ba4afc5893870103ddad863478a95a0cc63f74.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7b6db403d960509e257c82a4c5ba4afc5893870103ddad863478a95a0cc63f74.exe
Resource
win10v2004-20220812-en
General
-
Target
7b6db403d960509e257c82a4c5ba4afc5893870103ddad863478a95a0cc63f74
-
Size
201KB
-
MD5
731d4bf02a8dd11b5f55cc36f533db40
-
SHA1
f0ca4c6bc1ad5f7f99f1ac3bc4db874422ae03f2
-
SHA256
7b6db403d960509e257c82a4c5ba4afc5893870103ddad863478a95a0cc63f74
-
SHA512
e92e277f7c3a7e0a66d0b7ed80a456263be66b6fc934d5db8c54312ffdbf7e9bcc9c990196bc8d524b1b502a2d82f85d9fe53f1c41c4254951318516a0aaa2c6
-
SSDEEP
3072:B3X6bgYkYl4lXOucQHq6itJKpPKcDCdfX3r1OqEcvo4y+T:5pDlZKIPKcDCdfnROUvn
Malware Config
Signatures
Files
-
7b6db403d960509e257c82a4c5ba4afc5893870103ddad863478a95a0cc63f74.exe windows x86
3e20057bf715887671e6ec3d7efe996a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RemoveDirectoryA
IsDebuggerPresent
GlobalFindAtomA
GetModuleHandleW
lstrcmpA
GetTickCount
GetThreadLocale
SetLastError
CopyFileA
Sleep
QueryPerformanceCounter
GetModuleHandleA
GetLastError
GetCommandLineW
GetCurrentThread
GetDriveTypeA
lstrlenW
GetConsoleOutputCP
GlobalFindAtomW
GetCurrentThreadId
LoadLibraryW
GetVersion
DeleteFileW
GetProcessHeap
GetCommandLineA
MulDiv
DeleteFileA
GetWindowsDirectoryA
GetUserDefaultLangID
GetACP
GetCurrentProcess
lstrlenA
GetOEMCP
lstrcmpiA
SetCurrentDirectoryA
lstrcmpiW
GetStartupInfoA
GetCurrentProcessId
VirtualAlloc
user32
GetDC
CharNextA
GetDesktopWindow
GetSystemMetrics
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 113KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE