Static task
static1
Behavioral task
behavioral1
Sample
7461585cf8613eb0d709e5edc5092aec323dc9ea7b1e2ccd77ccb5bd9458c4b6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7461585cf8613eb0d709e5edc5092aec323dc9ea7b1e2ccd77ccb5bd9458c4b6.exe
Resource
win10v2004-20220812-en
General
-
Target
7461585cf8613eb0d709e5edc5092aec323dc9ea7b1e2ccd77ccb5bd9458c4b6
-
Size
55KB
-
MD5
1c6485f7addcb37f7a68e4d9ae66ec20
-
SHA1
74d0ee9c9c4c03473f63c6b9b620ec231894b285
-
SHA256
7461585cf8613eb0d709e5edc5092aec323dc9ea7b1e2ccd77ccb5bd9458c4b6
-
SHA512
191d7fa747b8dab6b66dcf213a9a3e0370c930aa4377caa2a51c56a224790028eda10eecdd08326f7caf5cb35e22fea39713514dc496c28acfe7a26220a3968b
-
SSDEEP
1536:0IcjuaRPulw3Q37/cMZznQYZzy1xVPhw22hFihwzb:XcjXYwA37/pbLy1xVPhwnFiob
Malware Config
Signatures
Files
-
7461585cf8613eb0d709e5edc5092aec323dc9ea7b1e2ccd77ccb5bd9458c4b6.exe windows x86
06862e0cc6b20fdeddcef609241ac4b0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetEnvironmentVariableA
HeapCreate
TlsGetValue
VirtualQuery
CancelIo
GetTimeFormatA
ResetEvent
GetCommandLineA
CreateEventA
CloseHandle
DeleteFileW
FindResourceW
GetVolumePathNameA
GetCommandLineA
CloseHandle
GetModuleHandleA
HeapDestroy
lstrlenA
Sleep
GetStartupInfoA
user32
FindWindowA
GetSysColor
DestroyMenu
GetClassInfoA
IsWindow
CreateIcon
CallWindowProcA
GetWindowLongA
DrawTextW
IsZoomed
DispatchMessageA
DispatchMessageA
PeekMessageA
psbase
SPDeleteSubtype
SPDeleteSubtype
SPDeleteSubtype
SPDeleteSubtype
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE