Static task
static1
Behavioral task
behavioral1
Sample
6926d78937fa8b9d59e71af3ab0c371997fa4671ba252b07d0a55d73f682ce8c.exe
Resource
win7-20220901-en
General
-
Target
6926d78937fa8b9d59e71af3ab0c371997fa4671ba252b07d0a55d73f682ce8c
-
Size
120KB
-
MD5
c0d2b9b3943a2d5e33830d976cb87f8d
-
SHA1
c53f06875448f337689c24c5fc6a2eb2e3e689bf
-
SHA256
6926d78937fa8b9d59e71af3ab0c371997fa4671ba252b07d0a55d73f682ce8c
-
SHA512
2e28971ce0a736ab432e090a966e58b7366e7079170ba6d1d6115beb109a9a636ef242ebb2fb9d5c7684c2b5d7be9f88bff39b9bb2139087f20d9a513af80ad8
-
SSDEEP
1536:shHwqBgIxeTK4Wc5oOEauN3zd6SpHQv1vllVyMOSMBk4/1RN+tODb1e9y:aBCMem4fGpju9A+49R48f
Malware Config
Signatures
Files
-
6926d78937fa8b9d59e71af3ab0c371997fa4671ba252b07d0a55d73f682ce8c.exe windows x86
f8c7d2a2a7980b863ed924f2d6000a7b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
Heap32First
lstrcmpA
GetACP
WaitForSingleObject
LoadLibraryA
GetDiskFreeSpaceW
lstrcpyW
GetCurrentDirectoryA
GetLongPathNameA
ReadFileEx
GetPrivateProfileIntA
InterlockedIncrement
GetModuleHandleW
ExitProcess
GetPrivateProfileSectionA
SetEnvironmentVariableA
GetExitCodeProcess
GetDiskFreeSpaceW
HeapCreate
GetStringTypeW
GetPrivateProfileIntA
FindResourceW
apphelp
SdbCreateMsiTransformFile
AllowPermLayer
ApphelpCheckExe
ApphelpCheckIME
clbcatq
ComPlusMigrate
SetupOpen
CheckMemoryGates
ComPlusMigrate
ComPlusMigrate
DllGetClassObject
SetupOpen
SetupOpen
SetSetupSave
DllGetClassObject
SetSetupSave
CheckMemoryGates
CheckMemoryGates
version
VerFindFileA
Sections
.text Size: 1024B - Virtual size: 928B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rsrc Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE