Static task
static1
Behavioral task
behavioral1
Sample
a6f7114c19ef82862b2f0410bfc9f9eeb33ae56bd733f2e788f007f5cbb0f329.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a6f7114c19ef82862b2f0410bfc9f9eeb33ae56bd733f2e788f007f5cbb0f329.exe
Resource
win10v2004-20220812-en
General
-
Target
a6f7114c19ef82862b2f0410bfc9f9eeb33ae56bd733f2e788f007f5cbb0f329
-
Size
305KB
-
MD5
94aa4c4e0a2dd4449d815225ffe6be20
-
SHA1
51837c6d0d865853f19ce7f2bdbf1ccc9ec50218
-
SHA256
a6f7114c19ef82862b2f0410bfc9f9eeb33ae56bd733f2e788f007f5cbb0f329
-
SHA512
772607d52e91c29bac56ed1414aa85c0bca3c789ec045cc3f3bbdfd5198c3992932cdb5d9ea1a7ece6f86a380196c32f5bbd938a31aa6b7525e92c3556851b1b
-
SSDEEP
6144:YxPPvvyMISV/JeRv/uJgytYnN4mdzXJmfEzuTGm9:Yxtg9JjHdz5mMJS
Malware Config
Signatures
Files
-
a6f7114c19ef82862b2f0410bfc9f9eeb33ae56bd733f2e788f007f5cbb0f329.exe windows x86
cdfe6757b9353a8b897ff4e76c21cba5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasW
FindClose
GetModuleHandleA
ResumeThread
EnterCriticalSection
GetCurrentThreadId
GetPrivateProfileStringW
GetCurrentProcessId
LocalFree
EnumCalendarInfoW
HeapCreate
GetDriveTypeW
GetFileAttributesA
FindAtomW
SetEvent
SetLastError
CreateMailslotA
GetModuleFileNameA
ReadFile
lstrlenA
user32
GetMenuInfo
GetCursorInfo
DrawTextW
GetKeyState
GetClassInfoA
GetClientRect
DispatchMessageA
CallWindowProcW
SetFocus
GetKeyboardType
DispatchMessageA
GetSysColor
IsWindow
admparse
IsAdmDirty
IsAdmDirty
IsAdmDirty
IsAdmDirty
IsAdmDirty
msasn1
ASN1BERDecBool
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ