Static task
static1
Behavioral task
behavioral1
Sample
08d606f9a7b79b6a1b7386489e4d0f7edfa969edde7ab66d546b393e84da0496.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
08d606f9a7b79b6a1b7386489e4d0f7edfa969edde7ab66d546b393e84da0496.exe
Resource
win10v2004-20220812-en
General
-
Target
08d606f9a7b79b6a1b7386489e4d0f7edfa969edde7ab66d546b393e84da0496
-
Size
127KB
-
MD5
6ae4ece645536cdfd80672ce8fa9d500
-
SHA1
442de920a800879a885765dab1311264b17bd9c4
-
SHA256
08d606f9a7b79b6a1b7386489e4d0f7edfa969edde7ab66d546b393e84da0496
-
SHA512
deb8dfe5d29d677c4a59b87e543b7360a2efa69c83fd936a715bcc313ed177ebb596d72a41fda4a10c77706e7a0f9306447fab638960e5bdaa2b8ef5cfa3773c
-
SSDEEP
1536:tiXBSWQCoSo5py+5V0eLi2nAyh2axHQH0LJJTaziD8SNYxq8KvmVnEV7w8ywoq:+SDvLV5+eLiEdLm0LvCUeEQ
Malware Config
Signatures
Files
-
08d606f9a7b79b6a1b7386489e4d0f7edfa969edde7ab66d546b393e84da0496.exe windows x86
a469548906e16af984310afe8da68521
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
ResumeThread
GetStdHandle
GetLocaleInfoA
CreatePipe
ResumeThread
GetFileAttributesA
ReadConsoleW
SuspendThread
VirtualProtect
WriteFile
GetDriveTypeA
GetCommandLineA
IsBadReadPtr
GetPriorityClass
CreateDirectoryA
GlobalSize
SetLocalTime
DeleteFileA
HeapSize
GetProcessHeap
user32
DestroyMenu
SetCursor
GetWindowTextW
DrawIcon
PeekMessageA
GetWindowLongA
GetWindowLongA
SetRect
SetFocus
GetMessageA
wsprintfA
DispatchMessageA
LoadCursorA
els
DllGetClassObject
DllRegisterServer
DllRegisterServer
DllGetClassObject
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 121KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE