Static task
static1
Behavioral task
behavioral1
Sample
6acf3475e2c62c52a7bc53aa16fe516bb468ed1cd1b2123cd5ba130a3d367c89.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6acf3475e2c62c52a7bc53aa16fe516bb468ed1cd1b2123cd5ba130a3d367c89.exe
Resource
win10v2004-20221111-en
General
-
Target
6acf3475e2c62c52a7bc53aa16fe516bb468ed1cd1b2123cd5ba130a3d367c89
-
Size
64KB
-
MD5
0647f295a413181e5752f61098266170
-
SHA1
f1ba35ca9d7c4cc875a97cc91910658fc1413331
-
SHA256
6acf3475e2c62c52a7bc53aa16fe516bb468ed1cd1b2123cd5ba130a3d367c89
-
SHA512
47b096ad124e3c6ba43dadffd52ac89ca3a967a74f75f7d228645a7dbaccd7a79fa35ede1aa4d74189fe82513a690ac8baec561044e2da4d7e433d747ae54790
-
SSDEEP
1536:Sbu89dMIOK+4w4Ka57FaRnsGvqyx/dfCq8ivFR5:S6UdMIOcrK2BaRsKvx16xiD
Malware Config
Signatures
Files
-
6acf3475e2c62c52a7bc53aa16fe516bb468ed1cd1b2123cd5ba130a3d367c89.exe windows x86
56ee3df4cbd87c9b115d8f678b2d04db
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetShortPathNameA
GetModuleHandleW
GetACP
InitializeCriticalSection
SetCurrentDirectoryA
WriteConsoleW
DeleteFileA
GetModuleHandleA
VirtualAlloc
CreateSemaphoreW
DeleteFileA
GetStringTypeW
DeleteFileA
CreateMailslotA
FatalExit
SetVolumeLabelA
DeviceIoControl
InterlockedExchange
CreatePipe
GetProcessHeap
SetEnvironmentVariableA
CreateFileMappingW
GetConsoleAliasA
mshtml
ShowHTMLDialog
ShowModalDialog
ShowModelessHTMLDialog
DllEnumClassObjects
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rrs Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avdr Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ