Static task
static1
Behavioral task
behavioral1
Sample
6a99bb2b6ca9e0d79af143ff076a8102fb9ea209aa258b717fd624f41b43b6cc.exe
Resource
win7-20220812-en
General
-
Target
6a99bb2b6ca9e0d79af143ff076a8102fb9ea209aa258b717fd624f41b43b6cc.exe
-
Size
2.0MB
-
MD5
f2c89e7f6837eb63bc62c5a711112d4c
-
SHA1
d93f98bf65f883208875175fde06f6c02bb17042
-
SHA256
6a99bb2b6ca9e0d79af143ff076a8102fb9ea209aa258b717fd624f41b43b6cc
-
SHA512
dc286c9cb3ca683557b5322c7ea46238a58bada4d75b37d1626c4ae20a394d09cf12106887ffa2d3eebe3faa65b76cd2d54218cf5bb91d3758dd2a5a74f7972a
-
SSDEEP
49152:V+5bTChxKCnFnQXBbrtgb/iQvu0UHOa5v:V+56hxvWbrtUTrUHOk
Malware Config
Signatures
Files
-
6a99bb2b6ca9e0d79af143ff076a8102fb9ea209aa258b717fd624f41b43b6cc.exe.exe windows x86
730073214094cd328547bf1f72289752
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResumeThread
WriteProcessMemory
VirtualProtectEx
GetModuleFileNameW
DuplicateHandle
GetCurrentProcess
SetFileTime
CopyFileW
GetDriveTypeW
GetFileTime
CreateFileW
SetErrorMode
GetTempFileNameW
GetTempPathW
ExitProcess
Sleep
DeleteFileW
CloseHandle
WaitForSingleObject
CreateProcessW
ReadProcessMemory
GetThreadSelectorEntry
GetThreadContext
GetLastError
lstrlenW
GetModuleHandleW
GetStartupInfoW
user32
MessageBoxA
shell32
ShellExecuteW
msvcrt
memset
wcscpy
free
_fileno
_chsize
wcsrchr
wcscat
malloc
fclose
fread
fwrite
fseek
_wfopen
sprintf
fflush
_exit
_XcptFilter
exit
_wcmdln
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 65KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE