Static task
static1
Behavioral task
behavioral1
Sample
c6143512adab78429e172badfef36f3779fdf17dc1d68465a5b9ccb4896a90b0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c6143512adab78429e172badfef36f3779fdf17dc1d68465a5b9ccb4896a90b0.exe
Resource
win10v2004-20220812-en
General
-
Target
c6143512adab78429e172badfef36f3779fdf17dc1d68465a5b9ccb4896a90b0
-
Size
814KB
-
MD5
a94e71521b1eebe3f81391e0938180a3
-
SHA1
f5374b85e0c1d05d946a7dddadb8960b718b0616
-
SHA256
c6143512adab78429e172badfef36f3779fdf17dc1d68465a5b9ccb4896a90b0
-
SHA512
2f244c71a6cb772ed253f97c902524d196b59df43569b18397f88e4cfa1897923927a8a65343043da3cd603bc003ed7941e354dda4c4ee3922bd8a2da23366a0
-
SSDEEP
12288:a/3VN9mt9oZp59r+7p/f1nfT42MSvkUdnF8K5rV7InOn7TcMfs4lE/ZQySFR4vS:aNFHg7lf1n74JSvkUdlEys4CGySFWvS
Malware Config
Signatures
Files
-
c6143512adab78429e172badfef36f3779fdf17dc1d68465a5b9ccb4896a90b0.exe windows x86
f14d404d924b73caed7142a224c4cd85
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateSemaphoreW
Sleep
CloseHandle
DeleteFileA
GetVersion
HeapCreate
FindResourceExA
HeapDestroy
GetStartupInfoA
SuspendThread
GetCommandLineW
WriteConsoleA
ExitProcess
SetLastError
GetModuleHandleA
lstrlenW
CloseHandle
GetEnvironmentVariableA
FindClose
OpenEventA
user32
DrawTextW
GetSysColor
PeekMessageA
IsZoomed
SetFocus
CallWindowProcW
GetWindowLongA
FindWindowA
GetClassInfoA
CreateIcon
DispatchMessageA
GetKeyState
DispatchMessageA
docprop
DllGetClassObject
DllGetClassObject
DllGetClassObject
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 806KB - Virtual size: 805KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ