Static task
static1
Behavioral task
behavioral1
Sample
6a5be89d22a71e8f8d7c29cac786e3c1b68134a0efdc9d9e811722f4af8c3574.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6a5be89d22a71e8f8d7c29cac786e3c1b68134a0efdc9d9e811722f4af8c3574.exe
Resource
win10v2004-20221111-en
General
-
Target
6a5be89d22a71e8f8d7c29cac786e3c1b68134a0efdc9d9e811722f4af8c3574
-
Size
62KB
-
MD5
97ac7b3e5b67e35f8e79f55fe564f65e
-
SHA1
ac8fce320507dea0e1fd45e0e86a983343f326b9
-
SHA256
6a5be89d22a71e8f8d7c29cac786e3c1b68134a0efdc9d9e811722f4af8c3574
-
SHA512
89d289de1e5fd00038dd1457a5c556ac9c3545f08e17fdb778b5ea41527b87704216485129fb3f57e46861eb5c8483408e1eccce1e6f773cebe4e9bba98ef97c
-
SSDEEP
768:LsQunQnfz+1XYrQJ/q5/07cCjahMSFlQenC8WcoMRdqPqg0YMwQAPMYtyIy:LsXQnfz+Ys/TjWFlQ+YMaj0YMnwMsyIy
Malware Config
Signatures
Files
-
6a5be89d22a71e8f8d7c29cac786e3c1b68134a0efdc9d9e811722f4af8c3574.exe windows x86
e3f52da561361e67f256981d8d5709d3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GetFileSize
GetProcAddress
VirtualAlloc
LoadLibraryA
VirtualProtect
LockResource
LoadResource
FindResourceA
HeapFree
GetProcessHeap
VirtualProtectEx
VirtualAllocEx
GetCurrentProcess
ExitProcess
ResetEvent
GetModuleHandleA
GetCurrentThreadId
HeapAlloc
InterlockedExchange
RtlUnwind
VirtualQuery
user32
PostMessageA
DispatchMessageA
TranslateMessage
GetMessageA
UpdateWindow
ShowWindow
CreateWindowExA
RegisterClassExA
DefWindowProcA
SendMessageA
PostQuitMessage
Sections
.text Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ