Static task
static1
Behavioral task
behavioral1
Sample
7647eee914a2380b6627f58db01660a1f02577d6f7598f1f7317ea358fe1d56f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7647eee914a2380b6627f58db01660a1f02577d6f7598f1f7317ea358fe1d56f.exe
Resource
win10v2004-20220812-en
General
-
Target
7647eee914a2380b6627f58db01660a1f02577d6f7598f1f7317ea358fe1d56f
-
Size
304KB
-
MD5
7d686d91715b71b787534328d0729560
-
SHA1
ff4c0c3f1ea200dd41345e5583644c99ad9b906d
-
SHA256
7647eee914a2380b6627f58db01660a1f02577d6f7598f1f7317ea358fe1d56f
-
SHA512
f7980f2d0e3ddfe3f85881b34b8e754380fcbf505421c32a640788850a5ad3580e6af22cea5fe95aee1a5da5692d3bea71913a58c777cf9bba390a407b41833c
-
SSDEEP
6144:8sXjp3W8trPlOvzC5d6FCsVDsx2ZnGHcxUvzLAEJr4XenX/Cf:8sXjA8trPMq8j0YG8KvHJs3
Malware Config
Signatures
Files
-
7647eee914a2380b6627f58db01660a1f02577d6f7598f1f7317ea358fe1d56f.exe windows x86
4a18a8f06836e19a7fbcd7a5c45778fe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteConsoleA
GetProcessHeap
InitializeCriticalSection
DeleteFileA
FatalExit
SetVolumeLabelA
DeleteFileA
Sleep
VirtualAlloc
DeviceIoControl
GetStringTypeW
DeleteFileA
GetACP
CreatePipe
CreateSemaphoreW
GetShortPathNameA
CreateFileMappingW
SetCurrentDirectoryA
CreateEventW
GetModuleHandleW
GetModuleHandleA
InterlockedExchange
SetEnvironmentVariableA
mshtml
PrintHTML
ShowModalDialog
DllCanUnloadNow
DllGetClassObject
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rrs Size: 295KB - Virtual size: 295KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avdr Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ