Static task
static1
Behavioral task
behavioral1
Sample
f6ce6e84e00d01eba29f5c23a85bd61f4a0d7304e17ce926e2e898ad2c6b780d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f6ce6e84e00d01eba29f5c23a85bd61f4a0d7304e17ce926e2e898ad2c6b780d.exe
Resource
win10v2004-20220901-en
General
-
Target
f6ce6e84e00d01eba29f5c23a85bd61f4a0d7304e17ce926e2e898ad2c6b780d
-
Size
811KB
-
MD5
152c43a3cb658811db43d7e9577af9b5
-
SHA1
95f8e9f43e2e29e9290b2e261c3c029e373ef0b5
-
SHA256
f6ce6e84e00d01eba29f5c23a85bd61f4a0d7304e17ce926e2e898ad2c6b780d
-
SHA512
cac81365fa235bb33486daad3156a0a81c0a68558303ce3db061ed4e9a00eef28b55d648ed0cefb23dc264f01275de0330f5504aded56b09eb09a79e4887dd80
-
SSDEEP
24576:XPA6n0cK8bp/z5Hc5WzjIM9m7E+z5yzGJS:XPAvc1V1HXzr9GgzG
Malware Config
Signatures
Files
-
f6ce6e84e00d01eba29f5c23a85bd61f4a0d7304e17ce926e2e898ad2c6b780d.exe windows x86
4ea2aa0c2f8941ab1436143865e825a0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
SetEvent
CreateDirectoryW
CreateSemaphoreW
lstrlenA
CreateFileA
GlobalFree
GetFileAttributesW
LoadLibraryA
SetLocalTime
HeapSize
OpenSemaphoreA
WriteConsoleA
ReadConsoleA
GetStartupInfoA
SetLastError
CloseHandle
DeleteFileA
VirtualProtect
GetModuleFileNameA
Sleep
GetProcessHeap
GetTickCount
GetFileSize
GetEnvironmentStringsA
user32
IsWindow
GetWindowLongA
DispatchMessageA
GetClassInfoA
DispatchMessageA
SetFocus
FindWindowA
CallWindowProcW
DrawTextW
GetSysColor
PeekMessageA
IsZoomed
DestroyMenu
wups
DllGetClassObject
DllRegisterServer
DllUnregisterServer
DllCanUnloadNow
advapi32
RegCloseKey
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 800KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE