Static task
static1
Behavioral task
behavioral1
Sample
a6072adfb0d5325dec6ab7f1983040ac97078a460f6c9c00d178a990101f2f4b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a6072adfb0d5325dec6ab7f1983040ac97078a460f6c9c00d178a990101f2f4b.exe
Resource
win10v2004-20221111-en
General
-
Target
a6072adfb0d5325dec6ab7f1983040ac97078a460f6c9c00d178a990101f2f4b
-
Size
100KB
-
MD5
8a1a61cdad578804726973a6e4e68ed6
-
SHA1
3faa12ea4b1b93e445e8eaa3a4316f47bf6d20f1
-
SHA256
a6072adfb0d5325dec6ab7f1983040ac97078a460f6c9c00d178a990101f2f4b
-
SHA512
76d905ee5798509937570413abb4c6141e3a00d6f5f78a786f193a2cb7188352f5dbc579abd2694b84e644b9c3fa6bcc667303f8c6311ca8a3f32c2449c09aa5
-
SSDEEP
1536:GPxCGBBg4W4KffYEXebvv7UVLPvY2E88VoMbGC:GpCf4fKuDQN/EDVoAGC
Malware Config
Signatures
Files
-
a6072adfb0d5325dec6ab7f1983040ac97078a460f6c9c00d178a990101f2f4b.exe windows x86
9caf0bc51193ea1b6124003776d611c3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
GetCurrentProcessId
GetCurrentThreadId
MultiByteToWideChar
GetThreadPriority
CreateThread
HeapAlloc
OpenProcess
HeapFree
SetLastError
GetProcAddress
CreateFileA
GetComputerNameA
Process32Next
GetFileAttributesA
CreateToolhelp32Snapshot
GetSystemDefaultLCID
LoadLibraryA
GetModuleHandleA
CloseHandle
GetProcessHeap
GetOEMCP
GetACP
GetCPInfo
SetStdHandle
IsBadCodePtr
IsBadReadPtr
LCMapStringW
GetTempPathA
FindFirstFileA
GetLastError
GetCurrentProcess
FindClose
GetCurrentThread
GetTickCount
Process32First
SetErrorMode
LCMapStringA
GetStringTypeW
Sleep
RtlUnwind
GetCommandLineA
GetVersion
ExitProcess
RaiseException
TerminateProcess
HeapReAlloc
HeapSize
ReadFile
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
FlushFileBuffers
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
GetStringTypeA
SetEndOfFile
user32
GetMessageA
GetDesktopWindow
GetForegroundWindow
GetClassLongA
GetWindow
GetWindowRect
GetWindowLongA
advapi32
SetServiceStatus
StartServiceA
ControlService
DeleteService
CreateServiceA
CloseServiceHandle
OpenSCManagerW
OpenProcessToken
shell32
ShellExecuteExW
Sections
.text Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ