Static task
static1
Behavioral task
behavioral1
Sample
bf6cee009d35a918ad586d23e34dadf7641524adc60a5b123f30bb7490ddb2fa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bf6cee009d35a918ad586d23e34dadf7641524adc60a5b123f30bb7490ddb2fa.exe
Resource
win10v2004-20221111-en
General
-
Target
bf6cee009d35a918ad586d23e34dadf7641524adc60a5b123f30bb7490ddb2fa
-
Size
306KB
-
MD5
40a6e7dacf8daf53a9402ba0e38303ff
-
SHA1
5659175f3ac5832d533e8877c699cbbb38657e21
-
SHA256
bf6cee009d35a918ad586d23e34dadf7641524adc60a5b123f30bb7490ddb2fa
-
SHA512
db7d197500118f8dd8538a7c12c50a9d5117ae6c87d694a4bed9198247f34b6d65ab94e3750c00231d4dcfa0a73b7b8a7b5e81f93fb2bf56a4c9c27dab8353f0
-
SSDEEP
6144:FEMWFftgjsdiDIh3JWCFmJuZPwA6GytfdG/xTziI182uYuREWFK:FtIftgLDxKmM4JGytWkI17uYuV
Malware Config
Signatures
Files
-
bf6cee009d35a918ad586d23e34dadf7641524adc60a5b123f30bb7490ddb2fa.exe windows x86
ebded6c12074adc387d844cf081f927b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSection
GetACP
VirtualAlloc
CreateMailslotA
LoadLibraryA
SetCurrentDirectoryA
WriteConsoleW
CreateSemaphoreW
SetEnvironmentVariableA
GetShortPathNameW
GetStringTypeW
DeleteFileA
DeleteFileA
SetVolumeLabelW
GetConsoleAliasA
GetStringTypeW
GetModuleHandleW
CreateFileMappingW
DeviceIoControl
GetProcessHeap
FatalExit
CreatePipe
DeleteFileA
mshtml
ShowModalDialog
ShowModelessHTMLDialog
ShowHTMLDialog
DllEnumClassObjects
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.orpc Size: 298KB - Virtual size: 298KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 1024B - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE