Static task
static1
Behavioral task
behavioral1
Sample
66e5dd971e5b1eec22b1792f4c328623467596eb8fd9475b670da75ea7dde066.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
66e5dd971e5b1eec22b1792f4c328623467596eb8fd9475b670da75ea7dde066.exe
Resource
win10v2004-20220812-en
General
-
Target
66e5dd971e5b1eec22b1792f4c328623467596eb8fd9475b670da75ea7dde066
-
Size
303KB
-
MD5
96ddcd3c92b2ce0cb33f025003825760
-
SHA1
010ee9cc7119e3874f35433e3f2da46f84762f4c
-
SHA256
66e5dd971e5b1eec22b1792f4c328623467596eb8fd9475b670da75ea7dde066
-
SHA512
6c189f4c5c1cdf17fbd3ea0856035ebaf188c384fc8c204a37ce11b9e4cc255604da5e0d99a5d5192bb033db581a3c25f000e1ddc265650599fb11321ae872cd
-
SSDEEP
6144:Ymhw7MzbgkkjoAko9qbVnjxD74X1BpWXCjX7i2F79sK:jxkjoAwbVt7yHPX9F79s
Malware Config
Signatures
Files
-
66e5dd971e5b1eec22b1792f4c328623467596eb8fd9475b670da75ea7dde066.exe windows x86
210c7b452a2f761ab305e348b610b5f6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
WriteFile
GetFileAttributesA
ReadConsoleW
GetPriorityClass
GlobalSize
IsBadReadPtr
HeapSize
GetModuleHandleA
CreateDirectoryA
CreatePipe
ResumeThread
GetStdHandle
DeleteFileA
GetCommandLineA
ResumeThread
VirtualProtect
SetLocalTime
GetLocaleInfoA
GetProcessHeap
GetDriveTypeA
SuspendThread
user32
GetMessageA
SetFocus
GetWindowLongA
GetWindowLongA
wsprintfA
SetCursor
DestroyMenu
GetWindowTextW
DispatchMessageA
SetRect
DrawIcon
PeekMessageA
LoadCursorA
els
DllRegisterServer
DllGetClassObject
DllGetClassObject
DllRegisterServer
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 296KB - Virtual size: 296KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE