Static task
static1
Behavioral task
behavioral1
Sample
c4656691dbdfaf4068d57c86eb592837e9943bb9b8856e1d5f20b36de981f3c5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c4656691dbdfaf4068d57c86eb592837e9943bb9b8856e1d5f20b36de981f3c5.exe
Resource
win10v2004-20220812-en
General
-
Target
c4656691dbdfaf4068d57c86eb592837e9943bb9b8856e1d5f20b36de981f3c5
-
Size
251KB
-
MD5
6b0b489d3f18afcb691c0b3c84850a60
-
SHA1
771325e321576e115cae301d2434673b5a548f98
-
SHA256
c4656691dbdfaf4068d57c86eb592837e9943bb9b8856e1d5f20b36de981f3c5
-
SHA512
920ae8cef29cfb36baecb096af93e4058443c46e6090d64884e174e60ae448fd7078ec5e339b2d615b5b444762269f89e00a5da68ecee18d15bb5805a18201d8
-
SSDEEP
6144:zTp3MGS4Wu2HOdfBJiUevm6zmN8fHsrGRnM:zKG+OdJJKuYmafwGRM
Malware Config
Signatures
Files
-
c4656691dbdfaf4068d57c86eb592837e9943bb9b8856e1d5f20b36de981f3c5.exe windows x86
0c2051d75391f64fa717f35d6ac0625f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CharUpperA
crypt32
CryptBinaryToStringW
ole32
CoCreateGuid
CoInitialize
CoUninitialize
kernel32
CloseHandle
CreateEventA
CreateFileA
DeleteFileW
ExitProcess
FreeEnvironmentStringsA
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetCurrentThreadId
GetEnvironmentStringsA
GetFileType
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetOEMCP
GetProcAddress
GetStdHandle
GetTickCount
GetVersion
LoadLibraryA
MultiByteToWideChar
SetConsoleCtrlHandler
SetEnvironmentVariableA
SetEnvironmentVariableW
SetStdHandle
SetUnhandledExceptionFilter
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WideCharToMultiByte
WriteFile
Sections
AUTO Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
DGROUP Size: 130KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ