Static task
static1
Behavioral task
behavioral1
Sample
6f0bd76348f449dc798086f19a2bc166ea6805ffde7db9d32805f838ec8a0ec3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6f0bd76348f449dc798086f19a2bc166ea6805ffde7db9d32805f838ec8a0ec3.exe
Resource
win10v2004-20221111-en
General
-
Target
6f0bd76348f449dc798086f19a2bc166ea6805ffde7db9d32805f838ec8a0ec3
-
Size
65KB
-
MD5
72b7d7b1a08ba4be96d31dbd91913fee
-
SHA1
3484296e1a9b5fa21add04f465867cdada8805a2
-
SHA256
6f0bd76348f449dc798086f19a2bc166ea6805ffde7db9d32805f838ec8a0ec3
-
SHA512
d52b6e9f13f11bf917110ee4ee29bf94f340e8350a3ba8a01df7395210f7807542ce0ac1872595c01252b78347b6f5abdab4670d5516baee35073a157bab3428
-
SSDEEP
768:DfE7Zh/TswD8sU5vLMu7PAiRKZ20u1tgfAyEP19R0Z5uSvk0BN1Nm0XRY:DfE7X9D8sMMOPAoKu/aY14LxMQLXR
Malware Config
Signatures
Files
-
6f0bd76348f449dc798086f19a2bc166ea6805ffde7db9d32805f838ec8a0ec3.exe windows x86
c6c8f9a2cdd71e1c6c79ef1d131b23b6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
CreateProcessA
HeapCreate
GetCurrentDirectoryA
SetLastError
FindResourceW
LocalFree
CreateFileW
UnmapViewOfFile
GetComputerNameA
GetModuleHandleA
Sleep
CloseHandle
lstrcpyA
GetCurrentThreadId
GlobalUnlock
lstrlenA
LoadLibraryExW
FindClose
PulseEvent
user32
IsWindow
GetDlgItem
DrawEdge
GetDC
FillRect
GetCaretPos
CreateWindowExA
CallWindowProcA
CheckRadioButton
SetFocus
DispatchMessageA
DrawMenuBar
CreateIcon
rsaenh
CPGenKey
CPDecrypt
CPSignHash
CPHashData
CPDeriveKey
msasn1
ASN1BERDecEoid
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 50KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE