Static task
static1
Behavioral task
behavioral1
Sample
d3be5856e0b6cd4c39e8746deae780f84cf37a2a8237547088bdcbaf7d76bde8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d3be5856e0b6cd4c39e8746deae780f84cf37a2a8237547088bdcbaf7d76bde8.exe
Resource
win10v2004-20220812-en
General
-
Target
d3be5856e0b6cd4c39e8746deae780f84cf37a2a8237547088bdcbaf7d76bde8
-
Size
177KB
-
MD5
6f89a897a8c23856c9a12328a13289f9
-
SHA1
bb50a3238cb0848019efdc3571390f958f284f63
-
SHA256
d3be5856e0b6cd4c39e8746deae780f84cf37a2a8237547088bdcbaf7d76bde8
-
SHA512
7dca7c68b4e9f68e182845c2e5cbabd6876564bde263630ebd6f1172238517f1d0d8a18e9e3904714e609f243bc70224cacfaa9df8d2cfbdcdbfafe15426ea47
-
SSDEEP
3072:Cs7pnjQbW6J/54N/YYiRmdkjvhlClWNmi6XoENQLpNfPyTFaOwhS2v:C6jTY4N/YfAdk7Y86XsNfPSw
Malware Config
Signatures
Files
-
d3be5856e0b6cd4c39e8746deae780f84cf37a2a8237547088bdcbaf7d76bde8.exe windows x86
e92f16a9edee6e3f35fb718d25ea24a2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowDC
DeleteMenu
GetWindowLongA
DispatchMessageA
SetTimer
MapWindowPoints
GetCapture
GetFocus
CreatePopupMenu
RegisterClipboardFormatA
kernel32
ExitThread
GetLastError
CreateFileA
lstrcmpiA
LoadLibraryA
lstrcmpA
GetCommandLineA
DeleteFileA
VirtualAlloc
LockResource
ExitProcess
GetACP
GetModuleHandleA
WaitForSingleObject
GetProcAddress
FreeLibrary
LocalFree
LocalAlloc
CreateEventA
advapi32
RegQueryValueExA
RegQueryValueA
RegEnumKeyA
Sections
CODE Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 124KB - Virtual size: 208KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ