Static task
static1
Behavioral task
behavioral1
Sample
6493d4712cc67c74cf7bee91bbc1476ebba8ac05ade0c3061be0172c06bb3822.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6493d4712cc67c74cf7bee91bbc1476ebba8ac05ade0c3061be0172c06bb3822.exe
Resource
win10v2004-20221111-en
General
-
Target
6493d4712cc67c74cf7bee91bbc1476ebba8ac05ade0c3061be0172c06bb3822
-
Size
164KB
-
MD5
4e7e05748cb124443501b9d1957465d0
-
SHA1
60b79a3291ff2f3e1818ad5eb23ec644179c8da2
-
SHA256
6493d4712cc67c74cf7bee91bbc1476ebba8ac05ade0c3061be0172c06bb3822
-
SHA512
1b8c252500ef1f32b72898b7cf3ad98070de86aece6e0a127500f6b4925e3f94e93ac57da71e144d3d0f249ea47793a62b0becb4c3851f5647b688a84e07e14f
-
SSDEEP
3072:kEIMc7dOIppHIQZalz5EiKsSLEqxfuMFX4bp+2Kam7cgrw/xyJH5gUSXx1:FIMc7dlUIqEinSLEgfuMd4bp+2Kj7X6n
Malware Config
Signatures
Files
-
6493d4712cc67c74cf7bee91bbc1476ebba8ac05ade0c3061be0172c06bb3822.exe windows x86
4823cf26e2f64807d938472e183290ec
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
Imports
winspool.drv
ClosePrinter
kernel32
GetVersionExW
GetTickCount
InterlockedExchange
LocalFree
LoadLibraryW
InterlockedDecrement
LocalAlloc
GetThreadPriority
GetCurrentThreadId
LockResource
GetVersion
CloseHandle
FlushFileBuffers
GetSystemDirectoryA
GetCurrentProcessId
IsBadReadPtr
GetVersionExA
GetFileType
TerminateProcess
GlobalFree
GetStartupInfoA
QueryPerformanceCounter
ole32
CoDeactivateObject
CoUninitialize
advapi32
RegQueryValueExW
RegOpenKeyExW
LsaGetSystemAccessAccount
RegSetValueExW
RegCreateKeyExW
RegCloseKey
Sections
.text Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 1004B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 95KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ