Static task
static1
Behavioral task
behavioral1
Sample
6ff0800882e62f858a282a4eefce228b90adf08a6b19eac6761fab59f7f4a1e2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6ff0800882e62f858a282a4eefce228b90adf08a6b19eac6761fab59f7f4a1e2.exe
Resource
win10v2004-20220901-en
General
-
Target
6ff0800882e62f858a282a4eefce228b90adf08a6b19eac6761fab59f7f4a1e2
-
Size
1.2MB
-
MD5
0ac87ec9e5acf3a63eb883a4ddb3b9a7
-
SHA1
477103048a12f77fbb4f50c735cf38f95d8b18c7
-
SHA256
6ff0800882e62f858a282a4eefce228b90adf08a6b19eac6761fab59f7f4a1e2
-
SHA512
3e0bebf76837f2266f7856bf1ea5f1d01e6f294fded4ade4f2eb967bee588506dce381608386c124a8430cd7ec65b1fb52aa31b7b2aa46a06718fe484c1dbcac
-
SSDEEP
12288:oXPFwAfbEOAG5Dh/UPRGe/6MDzTMhFz8e9FX7gRtDMzFscWJ/vQ:q+6dhs5Gw4ht8e9FrMtgzQZ
Malware Config
Signatures
Files
-
6ff0800882e62f858a282a4eefce228b90adf08a6b19eac6761fab59f7f4a1e2.exe windows x86
dbb268a858c1392d055274ded7894cf5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
SetFilePointer
CloseHandle
CreateFileA
GetModuleFileNameA
GetModuleHandleA
InterlockedDecrement
GetProcessHeap
HeapFree
EnumCalendarInfoExA
HeapValidate
IsValidLanguageGroup
IsBadWritePtr
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CompareStringA
WaitForMultipleObjects
HeapAlloc
ExitProcess
advapi32
RegOpenKeyExA
RegEnumKeyA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
RegDeleteValueW
RegEnumValueA
RegOpenKeyExW
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ