Static task
static1
Behavioral task
behavioral1
Sample
60920544edda9f47ed1b087f41c37f5ba15a2be458b92d5c5e1ee06d43e861ff.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
60920544edda9f47ed1b087f41c37f5ba15a2be458b92d5c5e1ee06d43e861ff.exe
Resource
win10v2004-20220901-en
General
-
Target
60920544edda9f47ed1b087f41c37f5ba15a2be458b92d5c5e1ee06d43e861ff
-
Size
258KB
-
MD5
4e90650497d84eb9c42545323b824961
-
SHA1
1efa96b1578640717ed231ef2ccf89dc6514aabc
-
SHA256
60920544edda9f47ed1b087f41c37f5ba15a2be458b92d5c5e1ee06d43e861ff
-
SHA512
a5acc7c9977f1f20477498acdff8bef7e0ff1bba4b24999bdefc0125df193349cdfed6f6780bc2285ce1c56ce1ca5f63bbacff61f7279c07cdf504bcdc10b7ce
-
SSDEEP
6144:Hoo/+7BVKstGEWjzTwCVYFNNAU/T21ihyHJf:X+7H+PG7Nl/TYJ
Malware Config
Signatures
Files
-
60920544edda9f47ed1b087f41c37f5ba15a2be458b92d5c5e1ee06d43e861ff.exe windows x86
aee84f88256d9d46fadaf207521ef811
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
GetDriveTypeA
user32
LoadIconA
LoadIconW
LoadCursorW
advapi32
RegOpenKeyExA
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text6 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text5 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text4 Size: 179KB - Virtual size: 179KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 278B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 856B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ