Static task
static1
Behavioral task
behavioral1
Sample
0a6fd6e357aee7b77b79d51f3954f518e2bfdf0845d14a86c129d19560ff42dd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0a6fd6e357aee7b77b79d51f3954f518e2bfdf0845d14a86c129d19560ff42dd.exe
Resource
win10v2004-20220901-en
General
-
Target
0a6fd6e357aee7b77b79d51f3954f518e2bfdf0845d14a86c129d19560ff42dd
-
Size
100KB
-
MD5
0b4d7659464ae169e74c977a56662940
-
SHA1
9c21e9a2750045a9dc601a2329758628d15db5c6
-
SHA256
0a6fd6e357aee7b77b79d51f3954f518e2bfdf0845d14a86c129d19560ff42dd
-
SHA512
8d7050c495fe9424974895609c4320e988960326def8a711470ef08a9d9a88fc84bc2debf5e9952f6b557bde86f709070d8701574a56103e8d0225d9b0c2af10
-
SSDEEP
3072:Isd91Gox09OjRVMIkyAKpUqLGBffsNTPMlfnudw:I4EgRKIkyJfGBffsxMlkw
Malware Config
Signatures
Files
-
0a6fd6e357aee7b77b79d51f3954f518e2bfdf0845d14a86c129d19560ff42dd.exe windows x86
f213c0a64519b6dc7337bea980568cc5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCreate
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
ExitProcess
GetStdHandle
GetCommandLineA
GetVersion
SetHandleCount
GetFileType
GetStartupInfoA
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
CloseHandle
VirtualFree
HeapFree
RtlUnwind
WriteFile
GetLastError
SetFilePointer
VirtualAlloc
HeapReAlloc
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
SetStdHandle
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE