Static task
static1
Behavioral task
behavioral1
Sample
86f2df4fe195d8d51c66e705f68470666f3c82f4b83f4dd737c7af141c9cde7a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
86f2df4fe195d8d51c66e705f68470666f3c82f4b83f4dd737c7af141c9cde7a.exe
Resource
win10v2004-20220901-en
General
-
Target
86f2df4fe195d8d51c66e705f68470666f3c82f4b83f4dd737c7af141c9cde7a
-
Size
68KB
-
MD5
6db6c7dcf651b4a94fcee235eeeca3f0
-
SHA1
0e2dbda4f1d6690bce08e9fa94b3abd8f71b3571
-
SHA256
86f2df4fe195d8d51c66e705f68470666f3c82f4b83f4dd737c7af141c9cde7a
-
SHA512
c91c3afc5c272beddc3e7ca5e2d684ef42ab19006fcce4b56db062236f42c42f8c8e760359bce904ded506eca5e4bdc425e039665532d9bc468abd602c08724b
-
SSDEEP
1536:eQq6h3ocuaVSY+A37feaCMJDmYsLIb4PvYqHB/AdG/:ej61ocuaVSDADeak7dJHB/AdG/
Malware Config
Signatures
Files
-
86f2df4fe195d8d51c66e705f68470666f3c82f4b83f4dd737c7af141c9cde7a.exe windows x86
33f4d0658894bb3cf180a35b8db523fb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetHandleCount
GetProcAddress
LoadLibraryA
GetVersion
HeapDestroy
GetFileType
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
FreeLibrary
GetStdHandle
GetStringTypeA
GetStringTypeW
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
VirtualAlloc
HeapReAlloc
MultiByteToWideChar
LCMapStringA
LCMapStringW
user32
MessageBeep
Sections
.text Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ