Static task
static1
Behavioral task
behavioral1
Sample
d45d7eebc3dc8f86df63d8bf87e5d012479940f6285759d159ddeb5e2c34259b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d45d7eebc3dc8f86df63d8bf87e5d012479940f6285759d159ddeb5e2c34259b.exe
Resource
win10v2004-20220812-en
General
-
Target
d45d7eebc3dc8f86df63d8bf87e5d012479940f6285759d159ddeb5e2c34259b
-
Size
1.1MB
-
MD5
21d3b7b24ff73073c184dbff4b8cb781
-
SHA1
3181f3ef5090eaa71dcc1e20ead11bf06c8b90d2
-
SHA256
d45d7eebc3dc8f86df63d8bf87e5d012479940f6285759d159ddeb5e2c34259b
-
SHA512
ceec4bc9d18e06c5b862d1ab8d182ca8eea35e10486d97a120ed175d7ffbf185b41bd2cb27550b9e3d09214764991bba56a4930de887541280454baa7d2030ee
-
SSDEEP
24576:GC0/DYpE9t5K3rtpWRjRffV8NzO4iR4tcUWxzy2mnbXtP3:K79t8KNRf9ECVf5yH
Malware Config
Signatures
Files
-
d45d7eebc3dc8f86df63d8bf87e5d012479940f6285759d159ddeb5e2c34259b.exe windows x86
a41686e1bd7193c6f1d0b6d9bc38c041
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
odbc32
SQLTablePrivileges
SQLProceduresA
CursorLibTransact
SQLAllocHandle
SQLSetDescFieldA
SQLFreeEnv
SQLGetConnectOptionA
SQLProcedureColumnsA
SearchStatusCode
SQLSetConnectAttr
SQLPrepare
SQLPrimaryKeysA
SQLGetStmtAttr
SQLRowCount
SQLPrimaryKeys
SQLColAttributesA
SQLStatisticsA
SQLSetEnvAttr
SQLTables
SQLSetCursorNameA
SQLGetFunctions
SQLSpecialColumnsA
SQLBrowseConnectA
SQLConnectA
SQLAllocEnv
SQLDriversA
SQLGetDescField
SQLGetTypeInfo
SQLProcedures
SQLExecDirect
VRetrieveDriverErrorsRowCol
CursorLibLockDbc
SQLSetConnectAttrA
SQLSetPos
SQLSetParam
SQLGetStmtAttrA
SQLGetCursorName
SQLAllocHandleStd
SQLColAttributeA
user32
EndPaint
ShowWindow
RegisterClassA
BeginPaint
DestroyWindow
UpdateWindow
DispatchMessageA
GetMessageA
DefWindowProcA
CreateWindowExA
TranslateMessage
SendMessageA
kernel32
WaitForMultipleObjects
PeekNamedPipe
GetThreadPriorityBoost
ReadFile
GetNamedPipeHandleStateA
SetFilePointerEx
SetEvent
GetVersion
InterlockedPopEntrySList
CompareStringA
OpenEventA
WaitNamedPipeA
SetEnvironmentVariableA
GetFileTime
VerSetConditionMask
CloseHandle
HeapFree
FileTimeToLocalFileTime
HeapCreate
CallNamedPipeA
InterlockedPushEntrySList
HeapReAlloc
TransactNamedPipe
SetFilePointer
CreateEventA
HeapAlloc
GetLastError
HeapDestroy
ExitProcess
GetEnvironmentVariableA
VirtualFree
SetProcessPriorityBoost
GetSystemTimes
CreateNamedPipeA
GetCurrentProcess
CreateFileA
GetCurrentThread
GetSystemTimeAsFileTime
VirtualAlloc
ReadFileScatter
SetFirmwareEnvironmentVariableA
ConnectNamedPipe
lstrcpynA
GetStringTypeA
Sections
.text Size: 595KB - Virtual size: 595KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 338KB - Virtual size: 337KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 171KB - Virtual size: 3.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ