?VexeVersion@@YAPADXZ
Static task
static1
Behavioral task
behavioral1
Sample
6bc12ee2cdab24c59653ad8afe5017b4fab7d44d910d7a7dad5f96ccfe15de97.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6bc12ee2cdab24c59653ad8afe5017b4fab7d44d910d7a7dad5f96ccfe15de97.exe
Resource
win10v2004-20220812-en
General
-
Target
6bc12ee2cdab24c59653ad8afe5017b4fab7d44d910d7a7dad5f96ccfe15de97
-
Size
23KB
-
MD5
0403df90650f15532ae23f1002edc6d0
-
SHA1
709ea2dd0c122477c943e98f5dcb1eb219415311
-
SHA256
6bc12ee2cdab24c59653ad8afe5017b4fab7d44d910d7a7dad5f96ccfe15de97
-
SHA512
0088504f53a1d3a65276f033a124639bdd14ccdf70ce2d101d3625d2099def3d55dd05459a28d6c450a4939186f685729a79a2ec9b5fb3fc591d9660d2da1b09
-
SSDEEP
384:7RYMPRSCa3NzRA92kQem4j1tQWsy4eWxb/HZd9Cm/rkm4no0:dYcRSCGZ4Rm4JAZOmoy0
Malware Config
Signatures
Files
-
6bc12ee2cdab24c59653ad8afe5017b4fab7d44d910d7a7dad5f96ccfe15de97.exe windows x86
db85b653e9a09da8366f5c18eea92ece
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__getmainargs
_adjust_fdiv
__p___initenv
_XcptFilter
_initterm
__setusermatherr
__p__commode
_controlfp
__p__fmode
sprintf
__set_app_type
_except_handler3
_exit
strcmp
strlen
strncmp
exit
atol
msvcirt
?cerr@@3Vostream_withassign@@A
??6ostream@@QAEAAV0@K@Z
??6ostream@@QAEAAV0@PBD@Z
?cout@@3Vostream_withassign@@A
?flush@ostream@@QAEAAV1@XZ
kernel32
GetLastError
GetConsoleCP
FormatMessageA
user32
GetDesktopWindow
wininet
InternetCloseHandle
InternetErrorDlg
InternetReadFile
HttpSendRequestA
HttpQueryInfoA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetSetOptionExA
InternetConnectA
InternetOpenA
InternetCrackUrlA
Exports
Exports
Sections
.text Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 452B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE