Static task
static1
Behavioral task
behavioral1
Sample
a6b03fc9feb4a3b4c1de2390ed6243fcf412e5b4d104b89c06d983a342d5a371.exe
Resource
win7-20220812-en
General
-
Target
a6b03fc9feb4a3b4c1de2390ed6243fcf412e5b4d104b89c06d983a342d5a371
-
Size
198KB
-
MD5
a36327381a0d526431134af2cce2c446
-
SHA1
4a8c29b674afa854b9884171a7e765f0d6a73901
-
SHA256
a6b03fc9feb4a3b4c1de2390ed6243fcf412e5b4d104b89c06d983a342d5a371
-
SHA512
8f8a6db087f6c797aa93f99c7118adb74b03dc555cea0d5e819d449c61449d0a4e67bf392bf7268c6967cae66b1d8b6666ae066b5763b9ccfd47a24d8d32807c
-
SSDEEP
6144:0+lUNMu0ACUNtqO01cq4hX6WDfOETeka2UTbj:oMhdcqhcJ1D2ETe
Malware Config
Signatures
Files
-
a6b03fc9feb4a3b4c1de2390ed6243fcf412e5b4d104b89c06d983a342d5a371.exe windows x86
3ceeb9793c59e24657b85b0a86b73ff5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
GetLastError
GetThreadContext
FlushInstructionCache
GlobalFree
HeapFree
GetVersionExW
TlsSetValue
GlobalUnlock
GetTempPathW
WriteProcessMemory
GetFileSize
LocalFree
GetStartupInfoA
GlobalLock
InterlockedDecrement
GetCurrentThreadId
ExitProcess
SetLastError
WaitForSingleObject
GlobalAlloc
SetLocaleInfoW
RtlUnwind
DuplicateHandle
InterlockedIncrement
RaiseException
InterlockedExchange
VirtualProtectEx
CreateFileW
HeapAlloc
GetCommandLineA
DeleteCriticalSection
FormatMessageA
GetWindowsDirectoryW
rpcrt4
NdrByteCountPointerFree
UuidCreate
UuidToStringA
RpcStringFreeA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
gdi32
SetMapMode
SelectObject
RealizePalette
DeleteDC
GetObjectA
UnrealizeObject
BitBlt
SelectPalette
CreateCompatibleDC
GetDeviceCaps
Sections
.text Size: 122KB - Virtual size: 122KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ