Static task
static1
Behavioral task
behavioral1
Sample
666a3e79c6d7a1f9dd41e356b1053e09923bd78da50bb79f3aae34d1455c283a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
666a3e79c6d7a1f9dd41e356b1053e09923bd78da50bb79f3aae34d1455c283a.exe
Resource
win10v2004-20220812-en
General
-
Target
666a3e79c6d7a1f9dd41e356b1053e09923bd78da50bb79f3aae34d1455c283a
-
Size
80KB
-
MD5
0f1c4717223652f37416c224ad3aee68
-
SHA1
13f72075f4ecb4bc419835621738ea8b521e6a2d
-
SHA256
666a3e79c6d7a1f9dd41e356b1053e09923bd78da50bb79f3aae34d1455c283a
-
SHA512
ee35e4c4e7a1199581f559d271da774aa1f68a8f92123ea70cea1a9e3d815d3641e665e68462f750e1554326b9029a056c32ed3eccb75478c9ef9602b93ddeeb
-
SSDEEP
1536:NBmkhX15vTUyiYXmLCOZZtLc1dLh9LkoV+982hW8fPL:/XhrvT6YXma1d99Ln898vYL
Malware Config
Signatures
Files
-
666a3e79c6d7a1f9dd41e356b1053e09923bd78da50bb79f3aae34d1455c283a.exe windows x86
f98ef1210452c83a63c0e162defee401
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetConsoleCP
GetShortPathNameW
HeapQueryInformation
CreateHardLinkA
VirtualQuery
SetThreadExecutionState
EnumCalendarInfoExW
GetTapePosition
GetProcessId
Process32NextW
RtlCaptureContext
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rrdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE