Static task
static1
Behavioral task
behavioral1
Sample
6340a8d13e6c0010c549fb51f0db25b7cb2765e265cb1b0fad1fbdded5a9305d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6340a8d13e6c0010c549fb51f0db25b7cb2765e265cb1b0fad1fbdded5a9305d.exe
Resource
win10v2004-20220812-en
General
-
Target
6340a8d13e6c0010c549fb51f0db25b7cb2765e265cb1b0fad1fbdded5a9305d
-
Size
144KB
-
MD5
85102fcc0c464f654895227c9a4db9e0
-
SHA1
84bfabfe347801d8521dc227ef519bc4b9398954
-
SHA256
6340a8d13e6c0010c549fb51f0db25b7cb2765e265cb1b0fad1fbdded5a9305d
-
SHA512
3959d537d4db42ab0e68b0ff4f30d4e7f2072bdd93c3dda14b0693b43d9346857e7cc4c00cb1a3854e01dbb63bb3c6bdba7c5a2bf9c8d7a241c3df1c6142bdd3
-
SSDEEP
3072:AGMohJ718OEiNBP718rBrBQyizKgtFJlsmik:LhJ58OdV7CFiyiWC6mik
Malware Config
Signatures
Files
-
6340a8d13e6c0010c549fb51f0db25b7cb2765e265cb1b0fad1fbdded5a9305d.exe windows x86
adf801abd4677429ccec4447083cae59
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesExA
GetLastError
GetModuleHandleA
GetProcAddress
CloseHandle
GetTempPathA
GetTickCount
RtlUnwind
SetLastError
GetCommandLineA
GetStdHandle
MultiByteToWideChar
GetFileType
LoadLibraryA
FreeLibrary
LocalFree
FindFirstFileA
LocalAlloc
WriteConsoleA
FormatMessageA
FindNextFileA
GetFileAttributesA
VerifyVersionInfoW
crtdll
__GetMainArgs
exit
raise
signal
ntdll
VerSetConditionMask
wcsncpy
wcschr
wcslen
memmove
_wcslwr
wcscmp
wcscpy
_wcsnicmp
wcscat
_ultoa
wcstoul
wcstol
user32
LoadStringA
winsta
WinStationOpenServerW
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 129KB - Virtual size: 364KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idat Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 434B - Virtual size: 434B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ