Static task
static1
Behavioral task
behavioral1
Sample
5e769cfcd694ec94ad67f7211045ad890af1ffce0148aacce21d42afb8392ca6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5e769cfcd694ec94ad67f7211045ad890af1ffce0148aacce21d42afb8392ca6.exe
Resource
win10v2004-20220812-en
General
-
Target
5e769cfcd694ec94ad67f7211045ad890af1ffce0148aacce21d42afb8392ca6
-
Size
303KB
-
MD5
a06fe99c4f111aad620542ee332aad30
-
SHA1
d9d9df360a662cda69af90a26b710bcc1ea83eb3
-
SHA256
5e769cfcd694ec94ad67f7211045ad890af1ffce0148aacce21d42afb8392ca6
-
SHA512
1ee445994f4f45eba34a4df5eb7b6e1381b16bf134fd15d336a0e763ee05d8dc00f946852c0ae9c6ac025fa2767c074d53c21bc976e1f740340794d086a76ea6
-
SSDEEP
6144:PVMzbyPUVA+flKTuS196sMkSVhZ2nC4YXxbbHNP:eKUu+fahbQ6MXlHN
Malware Config
Signatures
Files
-
5e769cfcd694ec94ad67f7211045ad890af1ffce0148aacce21d42afb8392ca6.exe windows x86
9fbbc6345c793777ae72163aeb6d5428
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetStdHandle
ResumeThread
HeapSize
SuspendThread
CreatePipe
IsBadReadPtr
SetLocalTime
WriteFile
DeleteFileA
CreateDirectoryA
GetFileAttributesA
GetLocaleInfoA
ResumeThread
VirtualProtect
GetDriveTypeA
GlobalSize
ReadConsoleW
GetCommandLineA
GetModuleHandleA
GetProcessHeap
GetPriorityClass
user32
LoadCursorA
wsprintfA
GetWindowLongA
PeekMessageA
GetWindowTextW
DispatchMessageA
DestroyMenu
GetMessageA
SetRect
SetCursor
GetWindowLongA
DrawIcon
SetFocus
els
DllGetClassObject
DllRegisterServer
DllRegisterServer
DllGetClassObject
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 296KB - Virtual size: 296KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE