Static task
static1
Behavioral task
behavioral1
Sample
6e738580e873a0cfe70d389cf4e40271deb2e735a078352b79821e041b3155c1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6e738580e873a0cfe70d389cf4e40271deb2e735a078352b79821e041b3155c1.exe
Resource
win10v2004-20220901-en
General
-
Target
6e738580e873a0cfe70d389cf4e40271deb2e735a078352b79821e041b3155c1
-
Size
110KB
-
MD5
0d92c5d6c1702d5bc285d8c69ed2f710
-
SHA1
79137c408c0b0b695e6946820089d30847f120d4
-
SHA256
6e738580e873a0cfe70d389cf4e40271deb2e735a078352b79821e041b3155c1
-
SHA512
71ce4773b92bce7965b0bedc15030232c892e7db199297f50291df5eb72c6ccf84997b2084c132876d49fc36e7aa817503530d66bf7af03cc0c10bb45b5c2734
-
SSDEEP
3072:FVXeZwQE1wypvtw7guUBQRs+nhl91hyHaGVQVr:ruuQEekFADRPnhl91hy6Gi
Malware Config
Signatures
Files
-
6e738580e873a0cfe70d389cf4e40271deb2e735a078352b79821e041b3155c1.exe windows x86
d6811e7c54697effaadd4a63b2392bd3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
shlwapi
PathFileExistsA
user32
RegisterClipboardFormatA
gdi32
SetMapMode
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
advapi32
RegQueryValueExA
shell32
SHGetSpecialFolderPathA
comctl32
ord17
oledlg
ord8
ole32
CoRevokeClassObject
olepro32
ord253
oleaut32
SysStringLen
wininet
InternetCrackUrlA
ws2_32
getprotobyname
Sections
.text Size: 101KB - Virtual size: 268KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE