Static task
static1
Behavioral task
behavioral1
Sample
6adb2a051cff5c717f15881bc83d96113e6bd27712d584b17d6e3d278e720ce1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6adb2a051cff5c717f15881bc83d96113e6bd27712d584b17d6e3d278e720ce1.exe
Resource
win10v2004-20220812-en
General
-
Target
6adb2a051cff5c717f15881bc83d96113e6bd27712d584b17d6e3d278e720ce1
-
Size
131KB
-
MD5
caa8548d73268b2f1eee32ec18ad717f
-
SHA1
79974582afccd38f131612d06f4fca09f4be7489
-
SHA256
6adb2a051cff5c717f15881bc83d96113e6bd27712d584b17d6e3d278e720ce1
-
SHA512
35d44f256adb65fcc073e13754b25430ad70d5750725ee32be05f502a5836a572805b326e127af0d78c3e478dbd37c7d4fa3f09efde690391e4c9db9a2705b9f
-
SSDEEP
3072:/8OYb8yXnLhijj9oyDBeTBI3cocKZJ3p2:/8BHL4jjuENHj
Malware Config
Signatures
Files
-
6adb2a051cff5c717f15881bc83d96113e6bd27712d584b17d6e3d278e720ce1.exe windows x86
e4d64b51e4ce179dc40cdf7f6764f48d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
HeapDestroy
ResetEvent
CreateFileMappingA
ReleaseMutex
SetLastError
HeapCreate
SetEvent
GetStartupInfoA
TlsAlloc
GetModuleFileNameA
GetCommandLineW
GetStdHandle
GetEnvironmentVariableA
IsBadCodePtr
GetModuleHandleA
CreateFileA
GetFileAttributesW
TlsGetValue
lstrlenA
user32
DispatchMessageA
DispatchMessageA
GetWindowLongA
GetClassInfoA
GetSysColor
DestroyMenu
IsWindow
CallWindowProcW
FindWindowA
CreateIcon
IsZoomed
PeekMessageA
DrawTextW
stclient
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
timedate.cpl
CPlApplet
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 123KB - Virtual size: 151KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE