Static task
static1
Behavioral task
behavioral1
Sample
d6e730c13231ff0b7a3f202f7a53ccf7dd5f9043c667030ee3c930daf6a4488d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d6e730c13231ff0b7a3f202f7a53ccf7dd5f9043c667030ee3c930daf6a4488d.exe
Resource
win10v2004-20220901-en
General
-
Target
d6e730c13231ff0b7a3f202f7a53ccf7dd5f9043c667030ee3c930daf6a4488d
-
Size
116KB
-
MD5
96cb240335db4bb3fea6179103c14b6e
-
SHA1
77ee6a6c954e4188b385065dc94b8f988a9e7131
-
SHA256
d6e730c13231ff0b7a3f202f7a53ccf7dd5f9043c667030ee3c930daf6a4488d
-
SHA512
164822f3edb4a54e95f9831c9c5ad4da589c6308cd047b1ffce1ddcf7bb28edc19dc2914193db2817587ed598ef7b6f3ca530cfae0adc4ddae46c2f1cf7a94f2
-
SSDEEP
3072:8+mae/KBC9l1LUyKA9q1wXSrawmwGbigbid1opll/GpBfmGed:IrKiFHKAlXSrX6Nb/ll/GpO
Malware Config
Signatures
Files
-
d6e730c13231ff0b7a3f202f7a53ccf7dd5f9043c667030ee3c930daf6a4488d.exe windows x86
89d0ee7bac0321aabd74e860f84704f3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetCurrentDirectoryA
CreatePipe
DeleteFileA
DeleteFileA
VirtualAlloc
SetVolumeLabelW
FatalExit
SetEnvironmentVariableA
WriteConsoleW
InitializeCriticalSection
CreateMailslotA
GetStringTypeA
DeviceIoControl
DeleteFileA
GetConsoleAliasA
GetProcessHeap
CreateSemaphoreW
GetACP
LoadLibraryA
GetShortPathNameW
CreateFileMappingW
GetModuleHandleW
GetStringTypeW
mshtml
ShowModelessHTMLDialog
ShowModalDialog
ShowHTMLDialog
DllEnumClassObjects
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.orpc Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE