Static task
static1
Behavioral task
behavioral1
Sample
66669b769b5b3cc52e0f9e129cd590ecb974181339d144dd265e367cc536b82c.exe
Resource
win7-20220812-en
General
-
Target
66669b769b5b3cc52e0f9e129cd590ecb974181339d144dd265e367cc536b82c
-
Size
117KB
-
MD5
08f4c7ca2f5e356980d63c33dc0c7c3a
-
SHA1
90c5558295a5b2a851067ba5951b21f6c247d89c
-
SHA256
66669b769b5b3cc52e0f9e129cd590ecb974181339d144dd265e367cc536b82c
-
SHA512
a7cad4dcede336ddae187108382dc4858eb7db2c37995355cb0ba924e97205591bc0d89b3f3a036cfbbc22d80f4b3b472f04171f67d8694ec2600d5a9bf66781
-
SSDEEP
3072:KK+UEo4Vscuy2G56QFGZ0iqTcDYK3DQM7m:aVoqsHy2I6Q80nT4DB
Malware Config
Signatures
Files
-
66669b769b5b3cc52e0f9e129cd590ecb974181339d144dd265e367cc536b82c.exe windows x86
64b592e5fc8fd035137e1d59f0853ee4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
WriteConsoleW
GetConsoleAliasA
GetShortPathNameW
GetStringTypeW
SetEnvironmentVariableA
CreateSemaphoreW
GetConsoleTitleA
InitializeCriticalSection
FatalExit
DeviceIoControl
DeleteFileA
GetProcessHeap
DeleteFileA
CreateMailslotA
LoadLibraryA
GetModuleHandleW
CreateFileMappingW
GetStringTypeW
VirtualAlloc
SetCurrentDirectoryA
SetVolumeLabelW
DeleteFileA
mshtml
DllEnumClassObjects
ShowModelessHTMLDialog
MatchExactGetIDsOfNames
ShowHTMLDialog
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.orpc Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avr Size: 1024B - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE