Static task
static1
Behavioral task
behavioral1
Sample
6e62aa8c6ba2c639a17dff855242243f77931b28993cc4eb320e8d3720cc3312.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6e62aa8c6ba2c639a17dff855242243f77931b28993cc4eb320e8d3720cc3312.exe
Resource
win10v2004-20220812-en
General
-
Target
6e62aa8c6ba2c639a17dff855242243f77931b28993cc4eb320e8d3720cc3312
-
Size
66KB
-
MD5
eb3c2855d41099476fc6390cefca524e
-
SHA1
299f5fd615e581262fd52c18806900a9f395dc5f
-
SHA256
6e62aa8c6ba2c639a17dff855242243f77931b28993cc4eb320e8d3720cc3312
-
SHA512
2ab7e47c59731f92b4da7facc5bbe6856dcc1a21596e77287d8fa731ed476076d4e1207916d0d828a29beea911096a90979f1f4321ebad807bc4150673fff7c0
-
SSDEEP
1536:4sXBhtPUVqw2Lb9X4OtijRshYJuCVeIp:4sXBhtP9LCR82e
Malware Config
Signatures
Files
-
6e62aa8c6ba2c639a17dff855242243f77931b28993cc4eb320e8d3720cc3312.exe windows x86
b48f1d1481792a87d70322d652ab3525
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleTitleA
GetProcessHeap
DeleteFileA
SetEnvironmentVariableA
SetCurrentDirectoryA
CreateFileMappingW
WriteConsoleW
GetModuleHandleW
CreateMailslotA
GetACP
GetShortPathNameW
SetFilePointer
VirtualAlloc
GetStringTypeW
SetVolumeLabelW
Heap32Next
LoadLibraryA
DeleteFileA
SetEndOfFile
Heap32First
GetStringTypeW
DeleteFileA
GetConsoleAliasA
msoeacct
DllCanUnloadNow
GetDllMajorVersion
ValidEmailAddress
DllGetClassObject
Sections
.text Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.orpc Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avr Size: 1024B - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE