Static task
static1
Behavioral task
behavioral1
Sample
015f858dee33d120b579709557d31d2f5aad75c670d3566a9c7269e6d2585cf4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
015f858dee33d120b579709557d31d2f5aad75c670d3566a9c7269e6d2585cf4.exe
Resource
win10v2004-20221111-en
General
-
Target
015f858dee33d120b579709557d31d2f5aad75c670d3566a9c7269e6d2585cf4
-
Size
65KB
-
MD5
6f13ed34632fc02221fe596cf8cc4440
-
SHA1
21c0287b9e22b620d5694ae5f6054d5ea38a8633
-
SHA256
015f858dee33d120b579709557d31d2f5aad75c670d3566a9c7269e6d2585cf4
-
SHA512
c27c1620692d497da79bef19413be30c3b5acab16e31975fc56eb9a9158bf54cde7a3757c30ad224f5e827617663ba10ae30cfc916fa64624888f84a71113bb4
-
SSDEEP
1536:yxEkUSxMo2CWzgcbQkoFKwQhQlwK0AtMvE6K:yKkUSxmLzbJdaw5Al6K
Malware Config
Signatures
Files
-
015f858dee33d120b579709557d31d2f5aad75c670d3566a9c7269e6d2585cf4.exe windows x86
97da09ca8f74ce7c8cba5c0b792796e8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
CreateSemaphoreW
SetEnvironmentVariableA
SetVolumeLabelA
DeleteFileA
VirtualAlloc
CreateMailslotW
GetACP
DeleteFileA
GetShortPathNameA
Sleep
CreateFileMappingW
GetStringTypeW
CreateFileA
CreatePipe
FatalExit
GetProcessHeap
GetModuleHandleA
CopyFileW
GetCurrentDirectoryW
DeviceIoControl
WriteConsoleA
CreateEventW
mshtml
DllCanUnloadNow
DllGetClassObject
ShowModalDialog
PrintHTML
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.RES Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avdr Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ