Static task
static1
Behavioral task
behavioral1
Sample
6bd804d02f178fd207125f25e5fd8b8826df34ad496ac1af03c2bc33f5f430ae.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6bd804d02f178fd207125f25e5fd8b8826df34ad496ac1af03c2bc33f5f430ae.exe
Resource
win10v2004-20220812-en
General
-
Target
6bd804d02f178fd207125f25e5fd8b8826df34ad496ac1af03c2bc33f5f430ae
-
Size
28KB
-
MD5
ab2a5579b6cf49a18f00e707ad44d6fa
-
SHA1
1cddffb9b591e7e5df8b7afcb3cc7e09971f02ce
-
SHA256
6bd804d02f178fd207125f25e5fd8b8826df34ad496ac1af03c2bc33f5f430ae
-
SHA512
85ddc435047d8acedf0944207f5c436ef966fe2323e576205b30a30ba362902f765bbdcdb24c6606a6bcf84524696c363e4714f623912fd029d72e68cebeca75
-
SSDEEP
384:Xy+ppmj1VlhX4WaXzfwwXNyiDx10jaQpRveBj0YUSHNpXoEqPQ0:Xy+ppmjflhXDMzfww9VypRvyLVqp
Malware Config
Signatures
Files
-
6bd804d02f178fd207125f25e5fd8b8826df34ad496ac1af03c2bc33f5f430ae.exe windows x86
62623e14345a8453a2a8bfc52428baf2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
HeapCreate
GetModuleHandleA
lstrlenW
LoadLibraryExA
TlsAlloc
CreateMutexA
GetEnvironmentVariableA
GetStdHandle
DeleteAtom
ReleaseMutex
CloseHandle
GlobalUnlock
GetProcessHeap
FindResourceA
GetCurrentThreadId
CreateFileA
GetExitCodeProcess
TlsGetValue
GlobalFree
user32
GetDC
GetDlgItem
DrawMenuBar
CallWindowProcA
FillRect
DrawEdge
SetFocus
IsWindow
CreateWindowExA
CreateMenu
CheckRadioButton
DispatchMessageA
GetCaretPos
rsaenh
CPGenKey
CPHashData
CPDeriveKey
CPDecrypt
CPSignHash
msasn1
ASN1BERDecEoid
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE