Static task
static1
Behavioral task
behavioral1
Sample
6decdf7314aa705d1e0e8783419a6ec5fc7b4cbdee310d741aa03916d085ff6b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6decdf7314aa705d1e0e8783419a6ec5fc7b4cbdee310d741aa03916d085ff6b.exe
Resource
win10v2004-20220812-en
General
-
Target
6decdf7314aa705d1e0e8783419a6ec5fc7b4cbdee310d741aa03916d085ff6b
-
Size
3KB
-
MD5
92ae6442917d94b0b10a907fda7fddf7
-
SHA1
7f4d4cd2ede87ac07fdf741c4df16294f2a46666
-
SHA256
6decdf7314aa705d1e0e8783419a6ec5fc7b4cbdee310d741aa03916d085ff6b
-
SHA512
5916e14810b953968340abac5e1d1757844836556f86ca6304f3b6c1892558ac485c9c5466114af2d42f1fe3b36dec4256575d86aa7415d6a2fb1d6534d0250d
Malware Config
Signatures
Files
-
6decdf7314aa705d1e0e8783419a6ec5fc7b4cbdee310d741aa03916d085ff6b.exe windows x86
5cee0286dca9dfc6de6b779a4cf42598
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
ExitProcess
GetModuleHandleA
GetProcAddress
GetThreadContext
ResumeThread
SetThreadContext
VirtualAllocEx
WriteProcessMemory
Sections
.text Size: 1024B - Virtual size: 540B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 312B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 856B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE