Static task
static1
Behavioral task
behavioral1
Sample
6cde7a4a202758e37fc592e12b8b602227971b4585772cc3e58f26f3d043fb2e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6cde7a4a202758e37fc592e12b8b602227971b4585772cc3e58f26f3d043fb2e.exe
Resource
win10v2004-20220812-en
General
-
Target
6cde7a4a202758e37fc592e12b8b602227971b4585772cc3e58f26f3d043fb2e
-
Size
22KB
-
MD5
96ded4195c19e41438bff13609478155
-
SHA1
968a52634271584b31ebbe10b8e887d9c30f27e3
-
SHA256
6cde7a4a202758e37fc592e12b8b602227971b4585772cc3e58f26f3d043fb2e
-
SHA512
bba9e55d5ed1ea085e1870e551cf849924df2e733e16e06494300ebed1f2fa28e178a4cab9949ac7a9eb4cfb824e6d521ed52818bcbb5cfa5e8287008647858e
-
SSDEEP
384:AqG/HBRcknCaqhXBm4WlLdGQCUc7ZlpHoB7Zh6glbYNkmBe8e9LOFZRxsj83xWph:AX5Rc/aEXBPWlLxc7le7P7bYNHB9Fyjv
Malware Config
Signatures
Files
-
6cde7a4a202758e37fc592e12b8b602227971b4585772cc3e58f26f3d043fb2e.exe windows x86
fa8753cee2a7135258e6b87911bb32b8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
GetCommandLineW
GetThreadContext
GetTempFileNameW
SetThreadContext
FreeResource
FindResourceW
LoadResource
CreateProcessW
WaitForSingleObject
GetModuleHandleW
GetTickCount
VirtualQueryEx
WriteFile
SizeofResource
ReadProcessMemory
GetFileAttributesW
CreateProcessA
TerminateProcess
GetModuleFileNameW
CreateFileW
lstrlenW
GetTempPathW
GetProcAddress
VirtualAlloc
VirtualProtectEx
VirtualAllocEx
LockResource
lstrcatW
CloseHandle
WriteProcessMemory
ResumeThread
shell32
SHFileOperationW
SHChangeNotify
shlwapi
StrChrW
StrRChrW
msvcrt
free
??2@YAPAXI@Z
??3@YAXPAX@Z
memset
memmove
malloc
Sections
pe Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ