Static task
static1
Behavioral task
behavioral1
Sample
4d97b117555a48c4a66bc998770a2299b87c55ad8ad40290fe2e607a9c0ef5bf.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4d97b117555a48c4a66bc998770a2299b87c55ad8ad40290fe2e607a9c0ef5bf.exe
Resource
win10v2004-20220812-en
General
-
Target
4d97b117555a48c4a66bc998770a2299b87c55ad8ad40290fe2e607a9c0ef5bf
-
Size
66KB
-
MD5
7ebb174f2ed5a77f132e2150731da737
-
SHA1
b7cfe5c8736f599191eac35a30afe361a6ec7490
-
SHA256
4d97b117555a48c4a66bc998770a2299b87c55ad8ad40290fe2e607a9c0ef5bf
-
SHA512
01a13c9d75508ba04d3b405757e4c5ef44a8bf1bb87632ca66c736a69cd0090e6bf549478ec4d86442a208792a3c1c97cdc789b737c7f3cc9b42dd970c014189
-
SSDEEP
1536:SEKpZXA1bOukgfH5mWhU92YKc0/7x14YuA:SEKXXjuRZmUtYYX4
Malware Config
Signatures
Files
-
4d97b117555a48c4a66bc998770a2299b87c55ad8ad40290fe2e607a9c0ef5bf.exe windows x86
653635e696704f2911e0108890152146
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
Heap32First
GetProcessHeap
GetStringTypeW
SetEnvironmentVariableA
SetEndOfFile
CreateFileMappingW
GetShortPathNameW
DeleteFileA
GetConsoleAliasA
WriteConsoleW
GetStringTypeW
GetConsoleTitleA
Heap32Next
DeleteFileA
SetFilePointer
SetVolumeLabelW
GetACP
LoadLibraryA
GetModuleHandleW
CreateMailslotA
SetCurrentDirectoryA
VirtualAlloc
msoeacct
GetDllMajorVersion
DllGetClassObject
DllCanUnloadNow
ValidEmailAddress
Sections
.text Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.orpc Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avr Size: 1024B - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE