Static task
static1
Behavioral task
behavioral1
Sample
f6874b7cd04b76ccf3a20c95ba01050b242478f4b8f03cf7a6aea27d4253dbb8.exe
Resource
win7-20220901-en
General
-
Target
f6874b7cd04b76ccf3a20c95ba01050b242478f4b8f03cf7a6aea27d4253dbb8
-
Size
112KB
-
MD5
d1f383081c573dba9de656fe38f98902
-
SHA1
ac6a7fffd539795c06c854ef0afddaa4d88d0de9
-
SHA256
f6874b7cd04b76ccf3a20c95ba01050b242478f4b8f03cf7a6aea27d4253dbb8
-
SHA512
c1691db48e132ccf43cb17aea4d9ebaaffc6811c7d3b955444c0397d5d28c686b166accd46f31e68dddb514af2a05080f3988b2406ade7f31089d0f1f391fc33
-
SSDEEP
1536:eNu8R25Wg3LYj+Ollht/PfTAYCdtHHYx2F5bbd6plRiowCYIelXZ8RHCr:sub5ij+ONt/PElbHHFVdcfiwel0ir
Malware Config
Signatures
Files
-
f6874b7cd04b76ccf3a20c95ba01050b242478f4b8f03cf7a6aea27d4253dbb8.exe windows x86
3ede871f504dee75b485f08c01cf3ea1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
InitializeCriticalSection
GetProcAddress
LocalFree
RaiseException
LocalAlloc
GetModuleHandleA
LeaveCriticalSection
EnterCriticalSection
GetShortPathNameA
ResumeThread
WriteProcessMemory
GetPrivateProfileSectionA
GetStringTypeA
LCMapStringW
LCMapStringA
RtlUnwind
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
user32
DefWindowProcA
AdjustWindowRectEx
Sections
0 Size: 40KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
1 Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
2 Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
3 Size: 48KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
4 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
5 Size: 8KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE