Static task
static1
Behavioral task
behavioral1
Sample
6684efa800af14adc2f5c33d705d5e8cdb498ce4eb9f8228597ea8137bb24611.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6684efa800af14adc2f5c33d705d5e8cdb498ce4eb9f8228597ea8137bb24611.exe
Resource
win10v2004-20220901-en
General
-
Target
6684efa800af14adc2f5c33d705d5e8cdb498ce4eb9f8228597ea8137bb24611
-
Size
758KB
-
MD5
0ba5878e7ed1b761267879c31733435a
-
SHA1
4b0344fcebddff1209e7ab30c14b6efd624fa09e
-
SHA256
6684efa800af14adc2f5c33d705d5e8cdb498ce4eb9f8228597ea8137bb24611
-
SHA512
bd8d1f4402ecf404669d509c901163d75522c650de633f44bc96e8a2133951b7f8a4178ffc461306fc02407705bd701c796feaeccb216564664b8b4e09e7af8d
-
SSDEEP
12288:EYbfgPryBPLRDow6bWN3c3fpd6e2mHIV9Tt2ISICKOacj0m0aCxVHThhrGr:rfgzCBowsU3c3fjemo7Tt2ehcjR0vHTi
Malware Config
Signatures
Files
-
6684efa800af14adc2f5c33d705d5e8cdb498ce4eb9f8228597ea8137bb24611.exe windows x86
6f77b1e2f9a4646c0a8a36d607c65232
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleTitleA
LocalFlags
VirtualQuery
HeapDestroy
GetFileAttributesA
lstrlenA
GetEnvironmentVariableA
GetModuleHandleA
TlsGetValue
GetCommandLineA
GetTimeFormatW
HeapCreate
GetCommandLineA
GetStartupInfoA
SetLastError
CloseHandle
CloseHandle
GetVolumePathNameW
CreateEventW
GetDriveTypeW
advapi32
IsValidSid
RegEnumKeyA
RegCreateKeyExW
IsValidAcl
IsValidSid
RegQueryValueW
InitializeSid
IsValidSid
RegDeleteValueA
CreateProcessAsUserA
IsValidSid
IsValidSid
IsValidSecurityDescriptor
unimdmat
UmAnswerModem
UmAnswerModem
UmAnswerModem
UmAnswerModem
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 753KB - Virtual size: 752KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ