Static task
static1
Behavioral task
behavioral1
Sample
6f3e60e661e6fc010f20e18a576ab0fddfca82d03ece3fa98597aed87f198145.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6f3e60e661e6fc010f20e18a576ab0fddfca82d03ece3fa98597aed87f198145.exe
Resource
win10v2004-20221111-en
General
-
Target
6f3e60e661e6fc010f20e18a576ab0fddfca82d03ece3fa98597aed87f198145
-
Size
296KB
-
MD5
7acb72aa68b4c160ae92ee7cb008c463
-
SHA1
ab21b6660d5930932a94be62ae6e0e2579bb339a
-
SHA256
6f3e60e661e6fc010f20e18a576ab0fddfca82d03ece3fa98597aed87f198145
-
SHA512
8ca579c176427d88f95ce79bc4fbbacbb37d947ce14284246ea2c3cac95bba2bd45a4347bb677c475541b441d186d7d902a50108a5d5e7278be3e4f8d4404666
-
SSDEEP
6144:WeH4vkfzP8bwIfLG0wIVZfl0BuJQJvDjsUjSvPIuq:WeH4CP8bwWvZZfQueVtjMPID
Malware Config
Signatures
Files
-
6f3e60e661e6fc010f20e18a576ab0fddfca82d03ece3fa98597aed87f198145.exe windows x86
581cd9da35e68b8b181f1ee6fc60d679
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetExitCodeProcess
ReadFileEx
LoadLibraryA
FindResourceW
lstrcpyW
GetLastError
SetEnvironmentVariableA
GetStringTypeW
GetPrivateProfileIntA
GetDiskFreeSpaceW
InterlockedDecrement
CloseHandle
GetDiskFreeSpaceW
HeapCreate
ExitProcess
ReadConsoleA
WaitForSingleObject
lstrcmpA
GetCurrentDirectoryA
Heap32First
InterlockedIncrement
adsldpc
ADsDeleteClassDefinition
ADsCloseSearchHandle
ADsEnumAttributes
ADsExecuteSearch
clbcatq
ComPlusMigrate
CheckMemoryGates
DllGetClassObject
ComPlusMigrate
CheckMemoryGates
SetupOpen
SetSetupSave
CheckMemoryGates
SetupOpen
SetSetupSave
SetupOpen
ComPlusMigrate
DllGetClassObject
version
VerFindFileA
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 292KB - Virtual size: 291KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ