Static task
static1
Behavioral task
behavioral1
Sample
6aaa703c49ec00e4079da4e3cf33aff75cd51e4f3a04ccea8afe7dff96b16446.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6aaa703c49ec00e4079da4e3cf33aff75cd51e4f3a04ccea8afe7dff96b16446.exe
Resource
win10v2004-20220812-en
General
-
Target
6aaa703c49ec00e4079da4e3cf33aff75cd51e4f3a04ccea8afe7dff96b16446
-
Size
1.8MB
-
MD5
e4e6f63de2dac452dd78245be5c55edf
-
SHA1
b6bc9b45c3d52ec7c8ae29117344b89050048086
-
SHA256
6aaa703c49ec00e4079da4e3cf33aff75cd51e4f3a04ccea8afe7dff96b16446
-
SHA512
c640b8f0d98a6a76aeee3e4ec59ff9396a78f113da987014319c826ba087ad5d7e87e7db0b7ab8a708ccc8ddc7a3a453c68213ef875bf0254553d5444a741160
-
SSDEEP
49152:TzJJzzkXK+ut90ty2vuvQrWb7YFW02eAuDStsTr/mJuN:/JJzoXK+H2YrqYR2eTStIrkuN
Malware Config
Signatures
Files
-
6aaa703c49ec00e4079da4e3cf33aff75cd51e4f3a04ccea8afe7dff96b16446.exe windows x86
6936bee7b3380ee9fb6bfbacbbcf3479
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
user32
UnregisterClassA
gdi32
LineTo
winmm
waveOutUnprepareHeader
msimg32
GradientFill
winspool.drv
DocumentPropertiesA
advapi32
RegCreateKeyExA
shell32
SHGetSpecialFolderPathA
ole32
CLSIDFromProgID
oleaut32
UnRegisterTypeLi
comctl32
ImageList_GetIcon
ws2_32
WSAAsyncSelect
comdlg32
GetFileTitleA
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
Sections
.text Size: 780KB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 1016KB - Virtual size: 1016KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ