Static task
static1
Behavioral task
behavioral1
Sample
64681b9b88d68a66888eb73cf888a0d82038fe1e91312a9ae926f5608e99109a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
64681b9b88d68a66888eb73cf888a0d82038fe1e91312a9ae926f5608e99109a.exe
Resource
win10v2004-20220812-en
General
-
Target
64681b9b88d68a66888eb73cf888a0d82038fe1e91312a9ae926f5608e99109a
-
Size
145KB
-
MD5
066fd875ea4f59168f49b61206978e91
-
SHA1
6f4b49c12df2cc166d4126529e1a0a3aec3e28cf
-
SHA256
64681b9b88d68a66888eb73cf888a0d82038fe1e91312a9ae926f5608e99109a
-
SHA512
0e30d2db2ae98cf501f6472bead48ade5a3d0f9180f2c464d8cf1c4c8de20bd7980c0b373185141fb60ab3cce8056ae3e8503901aea7109f813806149a297c15
-
SSDEEP
3072:YqjiRU9oQ5keaieIZN5rZUmNpL82eP4lU47lYtJJ0JGfTN2X:YaiQt1ZrZUm82eJ45YzaJ66
Malware Config
Signatures
Files
-
64681b9b88d68a66888eb73cf888a0d82038fe1e91312a9ae926f5608e99109a.exe windows x86
3ede871f504dee75b485f08c01cf3ea1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
InitializeCriticalSection
GetProcAddress
LocalFree
RaiseException
LocalAlloc
GetModuleHandleA
LeaveCriticalSection
EnterCriticalSection
GetShortPathNameA
ResumeThread
WriteProcessMemory
GetPrivateProfileSectionA
GetStringTypeA
LCMapStringW
LCMapStringA
RtlUnwind
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
user32
DefWindowProcA
AdjustWindowRectEx
Sections
0 Size: 51KB - Virtual size: 432KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
2 Size: 45KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
3 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
4 Size: 39KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE