Static task
static1
Behavioral task
behavioral1
Sample
a6dd5b51a6483f2b59ee4c631e7e2988c9c91f1b89c4e022aa38f73f46d126bb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a6dd5b51a6483f2b59ee4c631e7e2988c9c91f1b89c4e022aa38f73f46d126bb.exe
Resource
win10v2004-20220812-en
General
-
Target
a6dd5b51a6483f2b59ee4c631e7e2988c9c91f1b89c4e022aa38f73f46d126bb
-
Size
799KB
-
MD5
4e72627bd509af7932c74e3c4124b180
-
SHA1
9e6a3291e7093fb0673afce533ee3fc57980e727
-
SHA256
a6dd5b51a6483f2b59ee4c631e7e2988c9c91f1b89c4e022aa38f73f46d126bb
-
SHA512
ab313d56f360cd4536a617920ee5f25f05c7139e7e5cc5c71b9177b187cd548ce29176809fcd89d8439a1201d0aaef644a29150cdcfbdfdc7ecc8b45e173cf9f
-
SSDEEP
24576:SbOt3h7MznUMDelAJtoTfb2uS1992Evs5wR:Sby32zBFtoTTS199Q+
Malware Config
Signatures
Files
-
a6dd5b51a6483f2b59ee4c631e7e2988c9c91f1b89c4e022aa38f73f46d126bb.exe windows x86
e86cd4f3e4b1b8b1db913578efed9110
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
HeapSize
WriteFile
GetLocaleInfoA
GetFileAttributesA
GetStdHandle
SuspendThread
GetCommandLineA
GetDriveTypeA
ResumeThread
IsBadReadPtr
GlobalSize
VirtualProtect
CreateDirectoryA
SetLocalTime
ReadConsoleW
CreatePipe
GetModuleHandleA
GetProcessHeap
ResumeThread
DeleteFileA
GetPriorityClass
user32
SetRect
SetCursor
wsprintfA
GetMessageA
PeekMessageA
DrawIcon
GetWindowLongA
SetFocus
DispatchMessageA
GetWindowLongA
LoadCursorA
DestroyMenu
GetWindowTextW
els
DllGetClassObject
DllRegisterServer
DllRegisterServer
DllGetClassObject
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 692KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 793KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE