Static task
static1
Behavioral task
behavioral1
Sample
66a694a784b7925004c3d6e6ed46c73d955ad4a216af7d0c34e3edcf8c21680e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
66a694a784b7925004c3d6e6ed46c73d955ad4a216af7d0c34e3edcf8c21680e.exe
Resource
win10v2004-20220812-en
General
-
Target
66a694a784b7925004c3d6e6ed46c73d955ad4a216af7d0c34e3edcf8c21680e
-
Size
236KB
-
MD5
88394a3c48808fb47c7b764b13bcd696
-
SHA1
cad26653e0ae63c31fa427cf6c5009a88487f862
-
SHA256
66a694a784b7925004c3d6e6ed46c73d955ad4a216af7d0c34e3edcf8c21680e
-
SHA512
4e2d09811f6ad6941d5fef96ba96cd28cd8563a79e92ecde893a0d235f96e6518101115fce2f3b2f05729937ab2f2e8efd7466b9d032c7d3a5d4ab392d37b857
-
SSDEEP
3072:yPe3OAmvB1uVXgzuixSJCVG044Gr3pzwdPTMzxhxZgP1NPxQjt0Gdsfe2T:ycmvB41gzuiIJEQ5cPTmx2V01dsH
Malware Config
Signatures
Files
-
66a694a784b7925004c3d6e6ed46c73d955ad4a216af7d0c34e3edcf8c21680e.exe windows x86
bf141da9cb28af878e4f410df5faa430
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
_wcsnicmp
wcsncmp
wcsncpy
_wcsdup
free
wcscmp
memmove
memcpy
wcslen
kernel32
GetModuleHandleW
HeapCreate
HeapDestroy
ExitProcess
GetTickCount
Sleep
CloseHandle
InitializeCriticalSection
GetModuleFileNameW
GetCommandLineW
HeapAlloc
HeapSize
HeapFree
FreeLibrary
LoadLibraryW
WideCharToMultiByte
GetProcAddress
WriteFile
CreateFileW
GetFileSize
ReadFile
HeapReAlloc
Sections
.code Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 14B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 221KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ