Static task
static1
Behavioral task
behavioral1
Sample
715bd7c128659a4a7490c3c40dd5a147547e305ee8eadf877cf7f111d9c47224.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
715bd7c128659a4a7490c3c40dd5a147547e305ee8eadf877cf7f111d9c47224.exe
Resource
win10v2004-20221111-en
General
-
Target
715bd7c128659a4a7490c3c40dd5a147547e305ee8eadf877cf7f111d9c47224
-
Size
65KB
-
MD5
45445d0a00b790e1ef321882083aa560
-
SHA1
058b6d2a1f64be3653ec69aa1c8960e65d3ef931
-
SHA256
715bd7c128659a4a7490c3c40dd5a147547e305ee8eadf877cf7f111d9c47224
-
SHA512
6f9378eb49c22cea0ff157840af4f6d7c2704931281ccfe63374eaa5b2ece4c96872a448ad3c2fe0c3d2331f6761baf3d67f4308196765383be31cad97bf29a8
-
SSDEEP
1536:2V2uGQOactdXQlDPmVKzk6Si8EIDl0FBHHHHHHHHD:2V2uG996lDvzsEIDeF
Malware Config
Signatures
Files
-
715bd7c128659a4a7490c3c40dd5a147547e305ee8eadf877cf7f111d9c47224.exe windows x86
04897e115add2c6d8c83bffcd5e8075a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
SetFilePointer
GetConsoleTitleA
VirtualAlloc
CreateFileMappingW
GetConsoleAliasW
GetACP
GetStringTypeW
GetVersion
SetEndOfFile
GetStringTypeW
GetShortPathNameW
DeleteFileA
WriteConsoleW
SetCurrentDirectoryA
CreateMailslotW
Heap32First
DeleteFileA
SetEnvironmentVariableA
Heap32Next
DeleteFileA
LoadLibraryA
GetModuleHandleW
msoeacct
DllCanUnloadNow
ValidEmailAddress
GetDllMajorVersion
DllGetClassObject
Sections
.text Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 1024B - Virtual size: 544B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ