Static task
static1
Behavioral task
behavioral1
Sample
4c40f08955655d2ab90f4163630ba5568b09c5538e52bb80b0064553793c6f92.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4c40f08955655d2ab90f4163630ba5568b09c5538e52bb80b0064553793c6f92.exe
Resource
win10v2004-20220812-en
General
-
Target
4c40f08955655d2ab90f4163630ba5568b09c5538e52bb80b0064553793c6f92
-
Size
307KB
-
MD5
0c42700d32f56c63a758afe5cfbf3ea0
-
SHA1
1902b7cc4f7fa40959a6a74d449088c51c0d2b88
-
SHA256
4c40f08955655d2ab90f4163630ba5568b09c5538e52bb80b0064553793c6f92
-
SHA512
649670e63a9a213955d276ecf771df2a9bda638496842331e1079d891ce9e3d7f7e3cfc18a291e90c59d8cf689675616b35b295316795abab048ab208c6f67f5
-
SSDEEP
6144:84A77TU0liemENkpOR+whCH1YedTkEfwBw:2TU0TmEWpORrhK1YSk
Malware Config
Signatures
Files
-
4c40f08955655d2ab90f4163630ba5568b09c5538e52bb80b0064553793c6f92.exe windows x86
66835ec7831cfba8357df52028b261d9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
GetVersion
GetACP
VirtualAlloc
SetEndOfFile
SetEnvironmentVariableA
GetModuleHandleW
DeleteFileA
GetShortPathNameW
GetStringTypeW
DeleteFileA
SetFilePointer
Heap32First
WriteConsoleW
CreateFileMappingW
DeleteFileA
SetCurrentDirectoryA
GetConsoleTitleA
GetStringTypeW
CreateMailslotW
GetConsoleAliasW
LoadLibraryA
Heap32Next
msoeacct
DllGetClassObject
GetDllMajorVersion
DllCanUnloadNow
ValidEmailAddress
Sections
.text Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 298KB - Virtual size: 298KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avr Size: 1024B - Virtual size: 544B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ