Static task
static1
Behavioral task
behavioral1
Sample
69fa4098580b1c93ab40771553b6bf643c80d7a1699dff70a9a7e38bba476538.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
69fa4098580b1c93ab40771553b6bf643c80d7a1699dff70a9a7e38bba476538.exe
Resource
win10v2004-20220812-en
General
-
Target
69fa4098580b1c93ab40771553b6bf643c80d7a1699dff70a9a7e38bba476538
-
Size
239KB
-
MD5
81b82810f84b32342ce218f62f119960
-
SHA1
766dd75f28d9a93eb5b7928657506887c9bfb3d5
-
SHA256
69fa4098580b1c93ab40771553b6bf643c80d7a1699dff70a9a7e38bba476538
-
SHA512
878a41fe6d450ca2b3d82ca5d82d57b6ceefb78adfa788bf7a32cbaeb6a10b375a185b08b8895fa1f987cbdf7a3f334fbdd32acf2f32e72f9512cc311596add9
-
SSDEEP
6144:pved6oXbsXeQoXVbwztkME5za3s5HxYz8/MXFOYH:p66oouQoXV0kMI+8kz9XX
Malware Config
Signatures
Files
-
69fa4098580b1c93ab40771553b6bf643c80d7a1699dff70a9a7e38bba476538.exe windows x86
08dfa538edfe94f0b55866a7f7bc12a1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OutputDebugStringA
lstrcpyA
LoadLibraryA
GetProcAddress
GetStdHandle
CompareStringW
TerminateProcess
ExitProcess
SetConsoleMode
GlobalAlloc
WaitForSingleObject
SetUnhandledExceptionFilter
CreateThread
ntdll
RtlUnwind
user32
OpenClipboard
ShowWindow
DefWindowProcW
DispatchMessageW
TranslateMessage
KillTimer
PostQuitMessage
UpdateWindow
GetMessageW
comdlg32
GetOpenFileNameW
powrprof
IsPwrHibernateAllowed
GetActivePwrScheme
GetPwrCapabilities
IsPwrShutdownAllowed
imagehlp
MapFileAndCheckSumW
clusapi
ClusterEnum
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 227KB - Virtual size: 227KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ