Static task
static1
Behavioral task
behavioral1
Sample
bcc61a11783b7c7a864eee817fe9320065cdfd4991d977479d054edecf3862ff.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bcc61a11783b7c7a864eee817fe9320065cdfd4991d977479d054edecf3862ff.exe
Resource
win10v2004-20221111-en
General
-
Target
bcc61a11783b7c7a864eee817fe9320065cdfd4991d977479d054edecf3862ff
-
Size
84KB
-
MD5
a6e6b3522a559a5f0f6896ce5e780b82
-
SHA1
1b99cba18c90d14181021ba140f5439580a662d5
-
SHA256
bcc61a11783b7c7a864eee817fe9320065cdfd4991d977479d054edecf3862ff
-
SHA512
5b32dc53f7f3f9ea13dee875131cbd4026d409791679e57e0109b89e6fa115019a8ba4b97069b79baab59b8a8622847c05269c4f269600dff9fd2e726a1f5ac0
-
SSDEEP
1536:I3PtOphp38F66rwEHfWxVLoxFG3IAR2PYBMNSNmyExG+cW6el4cgl31Y:IkPMYOfsZ22Z2MhNzE4el4lhq
Malware Config
Signatures
Files
-
bcc61a11783b7c7a864eee817fe9320065cdfd4991d977479d054edecf3862ff.exe windows x86
e304217fc16c011615a0ec22783cbfae
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
lstrcatA
InitializeCriticalSection
GetProcAddress
LocalFree
RaiseException
LocalAlloc
GetModuleHandleA
LeaveCriticalSection
EnterCriticalSection
SearchPathA
ResumeThread
WriteProcessMemory
GetPrivateProfileSectionA
GetStringTypeA
LCMapStringW
LCMapStringA
RtlUnwind
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
user32
DefWindowProcA
AdjustWindowRectEx
Sections
0 Size: 26KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
1 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
2 Size: 44KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
3 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
4 Size: 7KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE