Static task
static1
Behavioral task
behavioral1
Sample
0bf6a2d787eea9254d4986ae36216c564d6682617fd7f7587d47a5c50248d1eb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0bf6a2d787eea9254d4986ae36216c564d6682617fd7f7587d47a5c50248d1eb.exe
Resource
win10v2004-20220901-en
General
-
Target
0bf6a2d787eea9254d4986ae36216c564d6682617fd7f7587d47a5c50248d1eb
-
Size
176KB
-
MD5
1083b822a339f9169b6a29107c884310
-
SHA1
7f8fd8723f9c7c1f7173c187a5d9999a725999d5
-
SHA256
0bf6a2d787eea9254d4986ae36216c564d6682617fd7f7587d47a5c50248d1eb
-
SHA512
a42ed48d751dc27332a0ac4bd5260501f235805ac24ce8085eaf7bfb35add35f4f9a958010c18c4acf675bfb292bddccfd551fcb5fbf068e1a8833f817a3afcb
-
SSDEEP
768:Bjw7fUcv4TmhC2435hm7j5xt/b8l0gRb/oSkRh:ujPs35hmX5xt/b83oSkRh
Malware Config
Signatures
Files
-
0bf6a2d787eea9254d4986ae36216c564d6682617fd7f7587d47a5c50248d1eb.exe windows x86
cd1bf12b8ece5e7248f3fa67f6d068df
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeEnvironmentStringsW
HeapAlloc
GetCommandLineA
GetVersion
ExitProcess
GetLastError
CloseHandle
WriteFile
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
TerminateProcess
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
SetFilePointer
ReadFile
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
HeapFree
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
RtlUnwind
SetStdHandle
FlushFileBuffers
CreateFileA
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
SetEndOfFile
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
Sections
.text Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 140KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE