Static task
static1
Behavioral task
behavioral1
Sample
d475e8853e154bbd0a524157b24d04a210232084a2baa9d1d232d1f467ba6fcf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d475e8853e154bbd0a524157b24d04a210232084a2baa9d1d232d1f467ba6fcf.exe
Resource
win10v2004-20220812-en
General
-
Target
d475e8853e154bbd0a524157b24d04a210232084a2baa9d1d232d1f467ba6fcf
-
Size
492KB
-
MD5
8c2a7eff5dfd00bcbff13d1743c14831
-
SHA1
3f5f0d52f4aba6b4e8cee27c84b2cd2d35572258
-
SHA256
d475e8853e154bbd0a524157b24d04a210232084a2baa9d1d232d1f467ba6fcf
-
SHA512
36935b07ffc632c1edff0d4ce8eb84e692cfe942986173fe229e250d416ea90fa4c56af3822f096eaf76133011f607ca5f1ec899d3153187aca60b5356a908d3
-
SSDEEP
12288:LwXhr8WYsgK5lm0SUa2+DCw6gJ8y4AmHOD:LwXh4GgK58dL2WLJ8iUO
Malware Config
Signatures
Files
-
d475e8853e154bbd0a524157b24d04a210232084a2baa9d1d232d1f467ba6fcf.exe windows x86
3f301ac8f8234ec2108dad614a404651
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteConsoleOutputA
GetModuleHandleA
GetLocaleInfoW
LeaveCriticalSection
GetCurrentThread
VirtualAlloc
EnumSystemLocalesA
GetCurrentProcessId
TlsGetValue
GetSystemTimeAsFileTime
MultiByteToWideChar
WideCharToMultiByte
GetShortPathNameW
FreeEnvironmentStringsA
GetFileType
GetProcAddress
GetTickCount
OpenMutexA
ExitProcess
CreateFileA
UnhandledExceptionFilter
GetVersionExA
ReadFile
GetModuleFileNameA
GetStringTypeW
GetCurrentThreadId
VirtualQuery
GetConsoleTitleA
InterlockedExchange
GetStringTypeA
GetCPInfo
lstrcmpi
GetStdHandle
WriteConsoleA
WriteConsoleW
GetLastError
RtlUnwind
LCMapStringA
SetEnvironmentVariableA
InterlockedDecrement
GetEnvironmentStrings
GetEnvironmentStringsW
FlushFileBuffers
FreeLibrary
SetStdHandle
GetConsoleOutputCP
GetProcessHeap
GlobalHandle
CloseHandle
WritePrivateProfileSectionW
GetUserDefaultLCID
HeapDestroy
SetHandleCount
LCMapStringW
GetConsoleMode
GetTimeZoneInformation
GetOEMCP
CompareStringW
GetStartupInfoA
LoadLibraryA
CreateMutexA
CompareStringA
SetUnhandledExceptionFilter
GetModuleFileNameW
TerminateProcess
GetCommandLineW
ExitThread
QueryPerformanceCounter
IsDebuggerPresent
GetACP
LoadLibraryExW
TlsFree
SetLastError
GetDateFormatA
Sleep
GetConsoleCP
EnterCriticalSection
HeapCreate
HeapSize
GetCommandLineA
RemoveDirectoryA
IsValidLocale
GetCurrentProcess
WaitForDebugEvent
DeleteCriticalSection
IsValidCodePage
WriteFile
InterlockedIncrement
FreeEnvironmentStringsW
HeapReAlloc
GetLocaleInfoA
HeapAlloc
HeapFree
GetShortPathNameA
GetTimeFormatA
SetFilePointer
VirtualFree
InitializeCriticalSection
TlsAlloc
GetAtomNameA
SetConsoleCtrlHandler
GetStartupInfoW
TlsSetValue
advapi32
LookupPrivilegeNameA
CryptGetDefaultProviderA
RegEnumKeyExA
comctl32
InitCommonControlsEx
user32
EnumClipboardFormats
RegisterClassA
GetSystemMenu
InSendMessage
CreateIcon
CreateDialogIndirectParamW
MsgWaitForMultipleObjectsEx
FindWindowExA
RegisterClassExA
DlgDirSelectExW
ImpersonateDdeClientWindow
GetWindowModuleFileNameW
GetUserObjectSecurity
SetWindowPos
wsprintfA
SetWindowPlacement
GetScrollPos
DeferWindowPos
SetKeyboardState
DrawEdge
EnumDesktopsA
Sections
.text Size: 317KB - Virtual size: 316KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 106KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ