Static task
static1
Behavioral task
behavioral1
Sample
a619eb4b34115d749b315f8f877f9078975cd09022cef048123f15c689bcc9a4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a619eb4b34115d749b315f8f877f9078975cd09022cef048123f15c689bcc9a4.exe
Resource
win10v2004-20221111-en
General
-
Target
a619eb4b34115d749b315f8f877f9078975cd09022cef048123f15c689bcc9a4
-
Size
400KB
-
MD5
49bfd2dcbfeda6702c9492cff4c90c30
-
SHA1
187f53236afcd346d6ccb087397e47c26502e95c
-
SHA256
a619eb4b34115d749b315f8f877f9078975cd09022cef048123f15c689bcc9a4
-
SHA512
13815978506ee1273b12aa4811b2f58ded2a5d64ac17aacbd07f87b0cf53a236424f41a658c6ebdb5832358d64ac61c01401ea43e144b31df3ab3ab8ed384808
-
SSDEEP
6144:RjEukUAz+rWc4mhfKVf/ZEG7OPi0IGNzJo1OTkr8rYQ0fn6UjD+9aOdlOp4CQ:pGtsfKVfaGqPFau4U2PZjDEljOiC
Malware Config
Signatures
Files
-
a619eb4b34115d749b315f8f877f9078975cd09022cef048123f15c689bcc9a4.exe windows x86
d4ea5df252308c0abfe0d23ad70d8f32
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
FatalExit
GetACP
GetStringTypeW
GetModuleHandleW
DeleteFileA
WriteConsoleW
CreateSemaphoreW
GetProcessHeap
SetCurrentDirectoryA
CreateMailslotA
SetVolumeLabelW
GetConsoleAliasA
SetEnvironmentVariableA
InitializeCriticalSection
DeleteFileA
LoadLibraryA
GetShortPathNameW
VirtualAlloc
CreateFileMappingW
CreatePipe
GetStringTypeA
DeviceIoControl
mshtml
ShowModalDialog
ShowModelessHTMLDialog
ShowHTMLDialog
DllEnumClassObjects
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.orpc Size: 393KB - Virtual size: 884KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 448B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE