Static task
static1
Behavioral task
behavioral1
Sample
15a15346fc0b299022d60f87fba56cff58b5b714acb72c43d4390f3290a88e0f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
15a15346fc0b299022d60f87fba56cff58b5b714acb72c43d4390f3290a88e0f.exe
Resource
win10v2004-20220812-en
General
-
Target
15a15346fc0b299022d60f87fba56cff58b5b714acb72c43d4390f3290a88e0f
-
Size
200KB
-
MD5
6e533712c609bac5b7c1817bf5dbcbca
-
SHA1
9d81cd1a1d175bec44d122ed6204028bb58f4d5a
-
SHA256
15a15346fc0b299022d60f87fba56cff58b5b714acb72c43d4390f3290a88e0f
-
SHA512
63b29ffc768a03aba462cd68d54e2bd9f563f369b9aecb55bf352cf45b9f6cdaf043dd2fbc19fb37a1bd7e2e97964a490c88f9f60ec4f1d7aa08d06f5ec21dc9
-
SSDEEP
3072:LBUqjX48LMT7jRqJ5ToLva9jFZYm0zUkDBhw21vrF+vSNelvKTuh:LBUU4gMT7jglFt9RkbLjF+qY9KS
Malware Config
Signatures
Files
-
15a15346fc0b299022d60f87fba56cff58b5b714acb72c43d4390f3290a88e0f.exe windows x86
b4bdd4ade73f2f240f822dd12f91bd53
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsDebuggerPresent
GetCurrentThread
GlobalFindAtomA
GetOEMCP
GetDriveTypeA
lstrlenW
lstrcmpiW
Sleep
RemoveDirectoryA
GetCurrentProcess
MulDiv
GetThreadLocale
SetCurrentDirectoryA
GlobalFindAtomW
LoadLibraryW
GetConsoleOutputCP
GetTickCount
lstrcmpA
GetCommandLineW
SetLastError
CopyFileA
GetLastError
GetCurrentProcessId
GetCommandLineA
lstrcmpiA
DeleteFileW
GetModuleHandleA
GetModuleHandleW
GetACP
GetProcessHeap
GetWindowsDirectoryA
QueryPerformanceCounter
GetStartupInfoA
GetVersion
GetUserDefaultLangID
GetCurrentThreadId
lstrlenA
DeleteFileA
VirtualAlloc
user32
GetSystemMetrics
GetDC
CharNextA
GetDesktopWindow
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ