Static task
static1
Behavioral task
behavioral1
Sample
c4ae1190205b1384155e2e6eb0206157be993ff48dd5c729ceea8e6128721a53.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c4ae1190205b1384155e2e6eb0206157be993ff48dd5c729ceea8e6128721a53.exe
Resource
win10v2004-20220812-en
General
-
Target
c4ae1190205b1384155e2e6eb0206157be993ff48dd5c729ceea8e6128721a53
-
Size
67KB
-
MD5
432939c686103e0e4f3b6942219d63a0
-
SHA1
f69a6b4bdb0b55ec226668b0d5e0ba6788962e90
-
SHA256
c4ae1190205b1384155e2e6eb0206157be993ff48dd5c729ceea8e6128721a53
-
SHA512
2dcae6dee247f402543dff94b5288f18607ba4a10280f29f2297a5f532a3ee98a39b866bc56d3876676e012c6b3e5f8684f2f9dbd0ecc517fee7b818e61fdab3
-
SSDEEP
1536:JqOM6fCX4FgATNmQ4U5pjVqtS2fmp6NDGCLjk0tJqxRNCa2ma:JqsCoF5NmsVyfY6brtoQG
Malware Config
Signatures
Files
-
c4ae1190205b1384155e2e6eb0206157be993ff48dd5c729ceea8e6128721a53.exe windows x86
735e74102bb9218b7a236a70e35e045e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
CreateMailslotW
SetEnvironmentVariableA
GetVersion
WriteConsoleW
GetConsoleTitleA
SetCurrentDirectoryA
CreateFileMappingW
GetProcessHeap
GetShortPathNameW
LoadLibraryA
DeleteFileA
DeleteFileA
GetModuleHandleW
GetACP
DeleteFileA
GetStringTypeW
Heap32Next
GetStringTypeW
SetEndOfFile
Heap32First
SetFilePointer
GetConsoleAliasW
msoeacct
ValidEmailAddress
DllCanUnloadNow
GetDllMajorVersion
DllGetClassObject
Sections
.text Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avr Size: 1024B - Virtual size: 544B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ