Static task
static1
Behavioral task
behavioral1
Sample
6bf17191d96535188880eefec919d6e8f27cebe1b539e36f0409c52f1b7f911f.exe
Resource
win7-20220901-en
General
-
Target
6bf17191d96535188880eefec919d6e8f27cebe1b539e36f0409c52f1b7f911f
-
Size
234KB
-
MD5
1039139a5f39c44da4492cd0a1a1797d
-
SHA1
7acbb38e9952feac772954547465b35d0fd57814
-
SHA256
6bf17191d96535188880eefec919d6e8f27cebe1b539e36f0409c52f1b7f911f
-
SHA512
7cf638da7005551a4cb98f27959373b01bba22678db0ade47bc501c6336e4e81e4f3ccdb0abff706a4d765fda92fe9a80c76066f34c282a32ecc1262be2737a2
-
SSDEEP
6144:rebSzr0gNIxQBIPs6DrEZ+sWItMT8S+jKcnq:aU/axaUHpsWRTx+3q
Malware Config
Signatures
Files
-
6bf17191d96535188880eefec919d6e8f27cebe1b539e36f0409c52f1b7f911f.exe windows x86
b3557dffa6d810f6a9d28e0300f50338
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
GetExitCodeProcess
GetDriveTypeA
GetSystemDirectoryA
GetCurrentDirectoryA
CloseHandle
GetDiskFreeSpaceA
WaitForSingleObject
CreateEventA
GetFileAttributesA
GetCommandLineA
GetModuleFileNameA
GetProcessHeap
CreateFileA
SetFileTime
CreateThread
LocalFileTimeToFileTime
CreateDirectoryA
HeapAlloc
HeapFree
SetFilePointer
ReadFile
WriteFile
ExitProcess
GetLastError
RemoveDirectoryA
DeleteFileA
TerminateProcess
SetEvent
SetEnvironmentVariableA
GetEnvironmentVariableA
WideCharToMultiByte
DosDateTimeToFileTime
FormatMessageA
user32
EndDialog
SendDlgItemMessageA
LoadStringA
DialogBoxParamA
ShowWindow
SendMessageA
MessageBoxA
comctl32
ord17
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
ntdll
strstr
_allmul
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zero Size: - Virtual size: 66KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 208KB - Virtual size: 212KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE