Static task
static1
Behavioral task
behavioral1
Sample
6ee135f80f3118d3c81b942e3f5a5f7d10b93223eb7696898df75bb08fa1ca57.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6ee135f80f3118d3c81b942e3f5a5f7d10b93223eb7696898df75bb08fa1ca57.exe
Resource
win10v2004-20220901-en
General
-
Target
6ee135f80f3118d3c81b942e3f5a5f7d10b93223eb7696898df75bb08fa1ca57
-
Size
485KB
-
MD5
79f84d3af54d1f1fcf460ab2a3d4dc71
-
SHA1
39d43ab86140d051ec4850841295812d751e60a6
-
SHA256
6ee135f80f3118d3c81b942e3f5a5f7d10b93223eb7696898df75bb08fa1ca57
-
SHA512
cfeacd469650c76e3f2141d887db479f98fcdb60b23cdeae99a55b24a39eed57fd372d9885e6167f546136d9d22bd56de431639164eac1e66dc3a0e3409ec1cc
-
SSDEEP
6144:4pivKpMmDm73Sf5wvcYm2sQ2xKYvjdBEHMm7DOe9HRGR4EFktwOmCJEuGG0:LKpMmb5wh1sQE9jjE6JeEkWG
Malware Config
Signatures
Files
-
6ee135f80f3118d3c81b942e3f5a5f7d10b93223eb7696898df75bb08fa1ca57.exe windows x86
35b0ae5045367e705c2b1e3696db53d9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SuspendThread
GetStartupInfoA
GetProcessTimes
GetCurrentProcessId
GetEnvironmentVariableA
CloseHandle
GetModuleFileNameA
FindAtomA
IsBadCodePtr
GetCommandLineA
HeapCreate
GetStdHandle
CreateMailslotA
ReadFile
GetModuleHandleA
DeleteAtom
DeleteFileA
GetPriorityClass
GetFileAttributesA
HeapDestroy
user32
SetFocus
DestroyMenu
GetKeyState
IsWindow
DispatchMessageA
GetWindowLongA
GetSysColor
GetClassInfoA
GetClientRect
GetWindowInfo
CallWindowProcW
DispatchMessageA
DrawTextW
DestroyMenu
mmcshext
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 376KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 475KB - Virtual size: 475KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ