Static task
static1
Behavioral task
behavioral1
Sample
6abd4b3020c35ae6c845e5fe2b688c8177b3c45d98a8d52827c631081dde0457.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6abd4b3020c35ae6c845e5fe2b688c8177b3c45d98a8d52827c631081dde0457.exe
Resource
win10v2004-20220812-en
General
-
Target
6abd4b3020c35ae6c845e5fe2b688c8177b3c45d98a8d52827c631081dde0457
-
Size
280KB
-
MD5
3b3fda277a46a69cb5b3905f29ed1990
-
SHA1
09a2f9cfd48e0c636d1ee7d4b5086fdd0d980ca2
-
SHA256
6abd4b3020c35ae6c845e5fe2b688c8177b3c45d98a8d52827c631081dde0457
-
SHA512
731427eb4685e408c0e10c0d93e39607f88f7b9c90bdc233abab24727eb764e02af419fcf4a7471ee36bc32a720751a3d4c44d1912388669919216c6ccc4c3c0
-
SSDEEP
6144:nXKbwzkHZNSEiqay+qjiiutshpHoiptSBLpgK:aUY5+VioZBn
Malware Config
Signatures
Files
-
6abd4b3020c35ae6c845e5fe2b688c8177b3c45d98a8d52827c631081dde0457.exe windows x86
1d0d0903d16a2e97ef023a493b153209
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetOEMCP
SetLastError
QueryPerformanceCounter
GetSystemTimeAsFileTime
FindResourceW
GetCurrentProcessId
HeapAlloc
GetLocalTime
GetProcessHeap
MultiByteToWideChar
HeapFree
lstrcmpA
SystemTimeToFileTime
GetTickCount
WideCharToMultiByte
LoadLibraryA
CreateFileA
GetCurrentProcess
lstrcpyW
lstrlenW
CloseHandle
GetLocaleInfoW
SetUnhandledExceptionFilter
fmifs
Extend
EnableVolumeCompression
FormatEx
DiskCopy
Format
ComputeFmMediaType
Chkdsk
w32topl
ToplScheduleCreate
ToplSTHeapInit
ToplScheduleExportReadonly
ToplScheduleCacheDestroy
ToplScheduleDuration
ToplSTHeapExtractMin
ToplSTHeapDestroy
ToplScheduleCacheCreate
Sections
.text Size: 270KB - Virtual size: 301KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ