Static task
static1
Behavioral task
behavioral1
Sample
ed1b6a5ae962586d9edc242ffa71fa3d02f6cbbfbafda2d0f221e0fd8fa258bd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ed1b6a5ae962586d9edc242ffa71fa3d02f6cbbfbafda2d0f221e0fd8fa258bd.exe
Resource
win10v2004-20220812-en
General
-
Target
ed1b6a5ae962586d9edc242ffa71fa3d02f6cbbfbafda2d0f221e0fd8fa258bd
-
Size
791KB
-
MD5
63d1eee88fd628d4671419c323b9e77a
-
SHA1
2849c45484492839c4c114ec9b0e96db88a12d72
-
SHA256
ed1b6a5ae962586d9edc242ffa71fa3d02f6cbbfbafda2d0f221e0fd8fa258bd
-
SHA512
57afcf5bc6cb28d51f15e259fcd19d5adf98c81b1703ab0d84370d604dd8719701f8b69c0b3d0684daed9cfbbee93ef03e01fd48118df8654e5047332104fa5a
-
SSDEEP
12288:END7cWU6wDL+En5wSYcy+7shhPTQ1S3qy+GKBmHJ5hyrJL2jrmQYWcoep58Xb/7W:END7B6ubhGkZKBmHTrHYWcRIs74w
Malware Config
Signatures
Files
-
ed1b6a5ae962586d9edc242ffa71fa3d02f6cbbfbafda2d0f221e0fd8fa258bd.exe windows x86
32ca8d5fca836efa8536566f0eee05c5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetModuleHandleA
LoadLibraryA
ExitProcess
CreateThread
VirtualAlloc
VirtualFree
ExitThread
GetSystemDirectoryA
CreateFileA
WriteFile
CloseHandle
FreeLibrary
GetFileTime
CompareFileTime
GetModuleFileNameA
GetCommandLineA
Sections
BitArts Size: - Virtual size: 196KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitArts Size: 73KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitArts Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitArts Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitArts Size: 669KB - Virtual size: 672KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE