Static task
static1
Behavioral task
behavioral1
Sample
598fe08572b138993f208f0dd2a6a47a444777db632fe1766e4ba92d642178ad.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
598fe08572b138993f208f0dd2a6a47a444777db632fe1766e4ba92d642178ad.exe
Resource
win10v2004-20220812-en
General
-
Target
598fe08572b138993f208f0dd2a6a47a444777db632fe1766e4ba92d642178ad
-
Size
66KB
-
MD5
17b43473d88506cb0f3700183fc4073b
-
SHA1
ace506ed49cab85d7797dc4fc2bc5b3ffe0b6fbf
-
SHA256
598fe08572b138993f208f0dd2a6a47a444777db632fe1766e4ba92d642178ad
-
SHA512
9919d2ebabf7358742ef6526adacf497964b5358c565cfb9f815d31ab6cfceee557d95259191196f9aa23dafde8517c7ac976c13b946b87c6f9dd35207b9e18c
-
SSDEEP
1536:cCx9Gjaz9I3OFvxdTneeI2U10C6KOmRbfOG37:/xSqi307mxOif
Malware Config
Signatures
Files
-
598fe08572b138993f208f0dd2a6a47a444777db632fe1766e4ba92d642178ad.exe windows x86
d8e602e4c8e15951c2cc69eb814deb33
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
VirtualAlloc
Heap32First
SetEnvironmentVariableA
Heap32Next
GetProcessHeap
SetVolumeLabelW
SetEndOfFile
DeleteFileA
DeleteFileA
GetConsoleAliasA
SetCurrentDirectoryA
DeleteFileA
LoadLibraryA
GetConsoleTitleA
CreateMailslotA
GetStringTypeW
GetShortPathNameW
CreateFileMappingW
GetModuleHandleW
WriteConsoleW
GetStringTypeW
SetFilePointer
msoeacct
DllCanUnloadNow
DllGetClassObject
GetDllMajorVersion
ValidEmailAddress
Sections
.text Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.orpc Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avr Size: 1024B - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE