Static task
static1
Behavioral task
behavioral1
Sample
6b7fe713d79f1b5d39dd31893620f7297173e8a981e3712722a3c9440699e4d5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6b7fe713d79f1b5d39dd31893620f7297173e8a981e3712722a3c9440699e4d5.exe
Resource
win10v2004-20220812-en
General
-
Target
6b7fe713d79f1b5d39dd31893620f7297173e8a981e3712722a3c9440699e4d5
-
Size
391KB
-
MD5
e5bb90c3223de7fcb8e4b10a859511cb
-
SHA1
fedb39404d6f2526ba34e5cab681c4f176db594b
-
SHA256
6b7fe713d79f1b5d39dd31893620f7297173e8a981e3712722a3c9440699e4d5
-
SHA512
3573942d0c0ed25d6da459980c538e7ff4e7f5e9c13e33f57b86e00a9ad35501522d279d3be2c32714a68240f208f3230ea3b806cfefe92d76cb045a4de7638a
-
SSDEEP
12288:UORMbHEAJLjpFv6w2K/PkFtlVMHFWg1EOfoMzCc3Sa0n:UORMbkAJLjpFvN/ytkjEOfoMWN
Malware Config
Signatures
Files
-
6b7fe713d79f1b5d39dd31893620f7297173e8a981e3712722a3c9440699e4d5.exe windows x86
eaf90a3bd13f8ee5d2de41344e5d0b34
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
FindAtomA
lstrlenW
ReleaseMutex
WriteFile
CreateEventW
GetCurrentThreadId
HeapCreate
GetCurrentProcessId
GetFileTime
TlsGetValue
LoadLibraryW
ReleaseMutex
GetEnvironmentVariableW
IsBadStringPtrW
LocalFree
GetPrivateProfileStringA
InitializeCriticalSection
GlobalFlags
GetDriveTypeA
user32
EndDialog
DrawStateW
CallWindowProcW
GetClassInfoA
GetSysColor
SetFocus
GetKeyboardType
CreateWindowExA
DispatchMessageA
GetSysColor
DrawTextA
GetClientRect
IsWindow
rastapi
DeviceDone
DeviceDone
DeviceDone
DeviceDone
DeviceDone
advapi32
InitializeSid
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 404KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 381KB - Virtual size: 380KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ