Static task
static1
Behavioral task
behavioral1
Sample
d3b93107bdb9c29a4ad0c1bdd074bbad1725c0079998387513ad00521155be2b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d3b93107bdb9c29a4ad0c1bdd074bbad1725c0079998387513ad00521155be2b.exe
Resource
win10v2004-20220901-en
General
-
Target
d3b93107bdb9c29a4ad0c1bdd074bbad1725c0079998387513ad00521155be2b
-
Size
22KB
-
MD5
0f93687089fe5515a65a9342e3481599
-
SHA1
f68456d35e73f2ddf73864ffaf9b3bfe4f4d1761
-
SHA256
d3b93107bdb9c29a4ad0c1bdd074bbad1725c0079998387513ad00521155be2b
-
SHA512
2f0ac74e86c34ccb1828abf6ad80fb6dae4d423fea8adcd447b7a880322bed32ba62d5b5ded8a1fa2ffadb235f19e861d94bcdcfe7b8a9b135a7686bf947f18a
-
SSDEEP
384:3ma8DkIP/IogfloDexuaqSikOawar5c1sgFL2XdPJCc++:2aEAogfWDjagmwar5QFL2Xxoc+
Malware Config
Signatures
Files
-
d3b93107bdb9c29a4ad0c1bdd074bbad1725c0079998387513ad00521155be2b.exe windows x86
b36a091d590b301fd668535c2b523774
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
NtAllocateVirtualMemory
_itoa
NtAdjustPrivilegesToken
rpcrt4
IUnknown_AddRef_Proxy
CStdStubBuffer_AddRef
CStdStubBuffer_Disconnect
CStdStubBuffer_IsIIDSupported
NdrOleFree
CStdStubBuffer_DebugServerQueryInterface
NdrOleAllocate
NdrDllCanUnloadNow
CStdStubBuffer_CountRefs
CStdStubBuffer_Invoke
NdrDllGetClassObject
IUnknown_QueryInterface_Proxy
CStdStubBuffer_DebugServerRelease
CStdStubBuffer_QueryInterface
IUnknown_Release_Proxy
CStdStubBuffer_Connect
NdrCStdStubBuffer_Release
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 10KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE