Static task
static1
Behavioral task
behavioral1
Sample
c5682064b4648fab164acf1776f1be0020c4c42200846904b177adf3406cbb08.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c5682064b4648fab164acf1776f1be0020c4c42200846904b177adf3406cbb08.exe
Resource
win10v2004-20220812-en
General
-
Target
c5682064b4648fab164acf1776f1be0020c4c42200846904b177adf3406cbb08
-
Size
205KB
-
MD5
6e279a56d202152d66cd02c584835363
-
SHA1
ee2fc56daa3c6cdd20a770ec3585cbb916ea8fea
-
SHA256
c5682064b4648fab164acf1776f1be0020c4c42200846904b177adf3406cbb08
-
SHA512
b2b1692913cac838d4aa6b30d02413fe982cc6faf88f9f342f1ea0ec836e61675ea1f077bcf0a92de756b90cf2c3ade7f0d63de2b8d4d31368ba6f6df1c52e94
-
SSDEEP
3072:r6sncMXgul/ylVLMquCXK3LpNrtWZRUmcxnTFAW6y3THw749ZgwZ+EsaeOmag6Y:r3FX9L8a3BWZu544MwZOLcg
Malware Config
Signatures
Files
-
c5682064b4648fab164acf1776f1be0020c4c42200846904b177adf3406cbb08.exe windows x86
329d38cdd4767be9db3613db28708b6e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
ExitProcess
GetModuleHandleA
GetProcAddress
lstrlenA
GetProcessHeap
HeapAlloc
GetVersionExA
HeapFree
FlushFileBuffers
GetConsoleMode
GetConsoleCP
CreateFileA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
WriteConsoleW
GetVersionExW
GetEnvironmentVariableW
GetTempPathW
GetModuleHandleW
CreateFileW
LoadLibraryExW
SetEvent
CreateThread
CreateProcessW
WaitForSingleObject
GetExitCodeProcess
MoveFileExW
CreateDirectoryW
ole32
CoRegisterMallocSpy
StringFromGUID2
CLSIDFromString
winmm
timeEndPeriod
comdlg32
GetOpenFileNameA
shlwapi
StrStrA
Sections
.text Size: 143KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 60KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 86B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ