Static task
static1
Behavioral task
behavioral1
Sample
6247072c7ab319eac906176f7cc06500637364818c3a8c2b8a18e7dd8864eac2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6247072c7ab319eac906176f7cc06500637364818c3a8c2b8a18e7dd8864eac2.exe
Resource
win10v2004-20220812-en
General
-
Target
6247072c7ab319eac906176f7cc06500637364818c3a8c2b8a18e7dd8864eac2
-
Size
83KB
-
MD5
23c79e55ad9fdeca9b7e3068ecc31e80
-
SHA1
8bfc668ebb15af0fdaaacad2280f984f3ef6566e
-
SHA256
6247072c7ab319eac906176f7cc06500637364818c3a8c2b8a18e7dd8864eac2
-
SHA512
09605b89558e50bfd74fb9ffeef68e9944bfb98bf67f489cd2cf286dcd744cb4fa987699475dce8fd90c9f44084295a75c0e2e6f140915af9ed2154e2a2371a4
-
SSDEEP
1536:5d818zqULshi5qJubQbWjj77swTjRkfaOO5:381cqk5qJubEi7TS5
Malware Config
Signatures
Files
-
6247072c7ab319eac906176f7cc06500637364818c3a8c2b8a18e7dd8864eac2.exe windows x86
4bbe9984791fe78df65ca9a3d1ff54d0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileMappingA
GetFileAttributesW
lstrlenA
GetModuleHandleA
TlsAlloc
GetStdHandle
GetCommandLineW
ResetEvent
SetEvent
HeapCreate
GetModuleFileNameA
GetEnvironmentVariableA
TlsGetValue
IsBadCodePtr
HeapDestroy
ReleaseMutex
CreateFileA
GetACP
GetStartupInfoA
SetLastError
user32
GetWindowLongA
IsWindow
PeekMessageA
DestroyMenu
DispatchMessageA
FindWindowA
IsZoomed
GetSysColor
GetClassInfoA
DrawTextW
CallWindowProcW
DispatchMessageA
CreateIcon
stclient
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
timedate.cpl
CPlApplet
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 74KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE