Static task
static1
Behavioral task
behavioral1
Sample
62f0d4072387ff9c0443ce5bb5ddff256acb95223ceb89e66a9d049b2c83e6ac.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
62f0d4072387ff9c0443ce5bb5ddff256acb95223ceb89e66a9d049b2c83e6ac.exe
Resource
win10v2004-20220812-en
General
-
Target
62f0d4072387ff9c0443ce5bb5ddff256acb95223ceb89e66a9d049b2c83e6ac
-
Size
206KB
-
MD5
6e398ee47451a9b03e045658504070a0
-
SHA1
ccd5f2a1ff7892fdd47fc5d65ca9cd204d9923fb
-
SHA256
62f0d4072387ff9c0443ce5bb5ddff256acb95223ceb89e66a9d049b2c83e6ac
-
SHA512
4994b6d9bbd38d90a3cce837f242593d6f7e6b68449d6eb31b404c7864b35f2bbe4ac3b33596864d31d1db5a1875c5cbee71e8a6fb249d2d8d915fbc0a8cf0fc
-
SSDEEP
3072:v0h8qzeY+yjaiRirM8prDYQ/1zvcQHEGpz7Y5u7EfV2LbAmGxqnkWx4X0:v0hZcM8pr0Y1ILGpOCbqsnli
Malware Config
Signatures
Files
-
62f0d4072387ff9c0443ce5bb5ddff256acb95223ceb89e66a9d049b2c83e6ac.exe windows x86
aa38779b51fc1f5bc5321e6a36e1e531
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CharNextA
GetSystemMetrics
GetDesktopWindow
GetDC
kernel32
lstrcmpiA
GetCurrentThreadId
GetModuleHandleW
lstrlenW
lstrcmpA
GetConsoleOutputCP
QueryPerformanceCounter
MulDiv
GetThreadLocale
lstrlenA
GlobalFindAtomA
GetCurrentProcessId
GetProcessHeap
GetUserDefaultLangID
GetCommandLineA
GetCurrentThread
GetCurrentProcess
GetOEMCP
GetTickCount
GetACP
VirtualAlloc
LoadLibraryW
GetModuleHandleA
SetCurrentDirectoryA
GetVersion
IsDebuggerPresent
DeleteFileW
GetStartupInfoA
lstrcmpiW
GetDriveTypeA
DeleteFileA
SetLastError
Sleep
GetCommandLineW
CopyFileA
GlobalFindAtomW
GetWindowsDirectoryA
GetLastError
RemoveDirectoryA
Sections
.text Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 114KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ