Static task
static1
Behavioral task
behavioral1
Sample
a6a5dfd2f69a733374a6eaf44f6ecc691515b77265ff368e4baebef354653b02.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a6a5dfd2f69a733374a6eaf44f6ecc691515b77265ff368e4baebef354653b02.exe
Resource
win10v2004-20220901-en
General
-
Target
a6a5dfd2f69a733374a6eaf44f6ecc691515b77265ff368e4baebef354653b02
-
Size
144KB
-
MD5
227171cd04c86bfb64e64de050f0b399
-
SHA1
ae5b1334aa2ccadeaf5fa81f46522d4577cee967
-
SHA256
a6a5dfd2f69a733374a6eaf44f6ecc691515b77265ff368e4baebef354653b02
-
SHA512
ed516b427755557c22947278b7bb7cbddfb206e69bbe5e6ed1a4a13bc872b1723048d908b75c3586ab25e998a6d196dd2894112e827be87cf2ec55b9e55c094a
-
SSDEEP
3072:NRn6GPa7aXwQNfRjrVOEf7Y4Qpyok9WUZxiv7u:N56Gfr9tMEfp9RZov7u
Malware Config
Signatures
Files
-
a6a5dfd2f69a733374a6eaf44f6ecc691515b77265ff368e4baebef354653b02.exe windows x86
ec5d697360306ce025888e1386f14089
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThread
GetComputerNameA
CreateMutexA
GetVersionExA
GetProcAddress
LoadLibraryA
GetCurrentDirectoryA
VirtualProtect
LockResource
LoadResource
GetCurrentProcessId
GetWindowsDirectoryA
LocalFree
GetCurrentProcess
ExitProcess
GetSystemDirectoryA
VirtualAlloc
GetCurrentThreadId
LocalAlloc
CreateEventA
FindResourceA
GetStdHandle
advapi32
GetUserNameA
user32
GetForegroundWindow
GetActiveWindow
GetSystemMetrics
msvcrt
memcpy
memset
wcslen
wcsncpy
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 14B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ