Static task
static1
Behavioral task
behavioral1
Sample
06ea3f77958bd1b477b10554ba6d5186988372758e76c2c6e8628bd81eff4974.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
06ea3f77958bd1b477b10554ba6d5186988372758e76c2c6e8628bd81eff4974.exe
Resource
win10v2004-20220812-en
General
-
Target
06ea3f77958bd1b477b10554ba6d5186988372758e76c2c6e8628bd81eff4974
-
Size
13KB
-
MD5
0b4b8e77bdc25970db6c34126b80ac60
-
SHA1
d242db19e31ffdc52a3f767ba5ac583186bd70db
-
SHA256
06ea3f77958bd1b477b10554ba6d5186988372758e76c2c6e8628bd81eff4974
-
SHA512
a7ac8cbd03af66aa8861864f17c8cc55f81ffdefa414d14d7ffcd01f803c87ed5360c0f586a91a7429c0c842940512837d82bb5f3bf5e19a185caccc48ff210a
-
SSDEEP
192:6FVQ6NRWhCQqVfeZQH4IYNpJ2mfMNMNeTL3TNeT4+v:G6uVfmQXYNpw9MNeLNek+v
Malware Config
Signatures
Files
-
06ea3f77958bd1b477b10554ba6d5186988372758e76c2c6e8628bd81eff4974.exe windows x86
04be554b9730d8213385c9d5b32941b4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
GetModuleHandleA
SetEvent
lstrlenA
CloseHandle
TlsGetValue
SearchPathA
FindResourceExA
FindAtomA
DeleteCriticalSection
GetCalendarInfoA
FindVolumeClose
VirtualProtect
ReleaseMutex
Sleep
GetLastError
CreateThread
GetDiskFreeSpaceA
ExitProcess
FindClose
advapi32
RegLoadKeyA
IsValidSid
GetFileSecurityA
FreeSid
AccessCheck
CloseEventLog
RegCloseKey
LsaFreeMemory
LsaClose
RegEnumKeyExA
OpenEventLogA
RegCreateKeyExA
CloseTrace
LsaSetSecret
RegCloseKey
msdtcuiu
DllGetClassObject
DllRegisterServer
DtcPerfClose
DtcPerfCollect
DtcPerfOpen
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE