Static task
static1
Behavioral task
behavioral1
Sample
ddf3a748583ee2b32dae1d4fad9ee5e6888c171f0f93f06f8752fa5e1ed79043.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ddf3a748583ee2b32dae1d4fad9ee5e6888c171f0f93f06f8752fa5e1ed79043.exe
Resource
win10v2004-20220414-en
General
-
Target
ddf3a748583ee2b32dae1d4fad9ee5e6888c171f0f93f06f8752fa5e1ed79043
-
Size
334KB
-
MD5
8e45b07b7dbf71049ec7590994ce5632
-
SHA1
8284940b7896c314d196ef7f1453687cd1b35a37
-
SHA256
ddf3a748583ee2b32dae1d4fad9ee5e6888c171f0f93f06f8752fa5e1ed79043
-
SHA512
4e1f9ef55a387138cd09f7ef8dad4776f11a35448b9664bb3c78a6c2c4c69c0024247cdd03668afcaa3c3c67f1407fe37dcf7927534e35d2e7d67bb37322f5eb
-
SSDEEP
3072:bcGO3EUDSiU7e2LFHMtLwxo3NC3vevW52crCHpQT6uq0wXJ1i9UqhfXBW/dKSVFq:PASnejtNW5sW4Z1NIPBY3
Malware Config
Signatures
Files
-
ddf3a748583ee2b32dae1d4fad9ee5e6888c171f0f93f06f8752fa5e1ed79043.exe windows x86
b119a2d633573806abce2ab20700ddfa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
WriteConsoleW
CreateFileW
SetFilePointerEx
GetConsoleMode
DecodePointer
WritePrivateProfileStructW
EnumDateFormatsExW
ReadDirectoryChangesW
FindFirstVolumeMountPointW
GetConsoleCP
FlushFileBuffers
HeapReAlloc
HeapSize
GetProcessHeap
LCMapStringW
CompareStringW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetCommandLineA
GetCommandLineW
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
HeapFree
HeapAlloc
GetCPInfo
GetStringTypeW
WideCharToMultiByte
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
MultiByteToWideChar
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetFileType
RaiseException
user32
CheckDlgButton
TileWindows
GetSubMenu
gdi32
GdiDeleteSpoolFileHandle
BeginPath
PolyTextOutW
PolyPolyline
winspool.drv
DeletePrinterDriverExA
EnumMonitorsW
advapi32
QueryUsersOnEncryptedFile
LsaQueryTrustedDomainInfoByName
CreatePrivateObjectSecurityEx
SystemFunction023
GetTrusteeFormA
RegQueryValueExW
shell32
SHGetFileInfo
CommandLineToArgvW
ole32
CoWaitForMultipleHandles
CoCreateFreeThreadedMarshaler
CoAddRefServerProcess
MonikerRelativePathTo
CreateStreamOnHGlobal
Sections
.text Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 29KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 180B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 226KB - Virtual size: 225KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ