Static task
static1
Behavioral task
behavioral1
Sample
a6b8a74f4996459a67f0d79206342f1c3191031d08f4f2e6fabf5d51ec5dfb89.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a6b8a74f4996459a67f0d79206342f1c3191031d08f4f2e6fabf5d51ec5dfb89.exe
Resource
win10v2004-20220901-en
General
-
Target
a6b8a74f4996459a67f0d79206342f1c3191031d08f4f2e6fabf5d51ec5dfb89
-
Size
151KB
-
MD5
d93252b99434e557cc5f20c2c98cf079
-
SHA1
695491f55f8d142d6128dacb80f0a65d4b10bfda
-
SHA256
a6b8a74f4996459a67f0d79206342f1c3191031d08f4f2e6fabf5d51ec5dfb89
-
SHA512
457b2ccf06d6c8df598dd7ac26077dc937973ea818e416bd7d65354ed89a0dce1eeb8f96a9ac7f19a7469aa95b284d37bda37853b683ffccee49de5d90a86f2a
-
SSDEEP
3072:xnAshH6sxQ3hWKSTH2TmZj6g8ytlsx2xPBqQbCtAr1S0ahF2VJZN:xnAshH6BxW5H2TQGvklsAx5ZYQS0sSrN
Malware Config
Signatures
Files
-
a6b8a74f4996459a67f0d79206342f1c3191031d08f4f2e6fabf5d51ec5dfb89.exe windows x86
eb6ea5cd18e14328627c3ab876a2adc5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
crtdll
memset
strcpy
strlen
strcat
strncpy
strcmp
memcpy
kernel32
GetModuleHandleA
HeapCreate
Sleep
HeapDestroy
ExitProcess
InitializeCriticalSection
GetModuleFileNameA
GetCurrentProcess
DuplicateHandle
CloseHandle
CreatePipe
GetStdHandle
HeapAlloc
CreateProcessA
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetTempPathA
LoadLibraryA
GetProcAddress
FreeLibrary
CreateDirectoryA
CopyFileA
DeleteFileA
FindFirstFileA
SetFileAttributesA
FindNextFileA
FindClose
RemoveDirectoryA
WriteFile
CreateFileA
GetFileSize
SetFilePointer
ReadFile
HeapReAlloc
shell32
ShellExecuteA
ShellExecuteExA
Sections
.code Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 11B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE