Static task
static1
Behavioral task
behavioral1
Sample
d4550f7dc53d06ca0c6b508ded57806fd1a4e7a0a9d6a4bba88113de981f3c8a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d4550f7dc53d06ca0c6b508ded57806fd1a4e7a0a9d6a4bba88113de981f3c8a.exe
Resource
win10v2004-20220812-en
General
-
Target
d4550f7dc53d06ca0c6b508ded57806fd1a4e7a0a9d6a4bba88113de981f3c8a
-
Size
103KB
-
MD5
088fd39e57c367d481d14cbdec522101
-
SHA1
92880d8335789247a736c8fc14197e105703cfab
-
SHA256
d4550f7dc53d06ca0c6b508ded57806fd1a4e7a0a9d6a4bba88113de981f3c8a
-
SHA512
aab02dbb959751f038df727591bb9eceadae5af156ade5957d14f31d35ed0881dad99e101b4d79d6de86033bd67b77da6ffd66b5955e290f66741bead228f5d1
-
SSDEEP
1536:W/c59EcdXv6/tshEsbwjOdKVEegMyM6SYWArwUT9XhfcfRUNv79sESmv7V:W/8hZv6/WGs0jOwVE8dnABTXfcEzSEj
Malware Config
Signatures
Files
-
d4550f7dc53d06ca0c6b508ded57806fd1a4e7a0a9d6a4bba88113de981f3c8a.exe windows x86
c5beae03ee8403e4a260be14b4157ab0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAddAtomA
VirtualAlloc
SetThreadLocale
GetCurrentProcessId
FreeLibrary
HeapDestroy
LoadLibraryA
GetProcAddress
DeleteFileA
GetCurrentThread
GetFileAttributesA
RaiseException
GetStringTypeW
LocalReAlloc
LocalFree
lstrcmpiA
GetStdHandle
CreateFileA
GetOEMCP
GetVersionExA
EnumCalendarInfoA
GetModuleFileNameA
GetStringTypeA
GetSystemDefaultLangID
SetFilePointer
GetStartupInfoA
EnterCriticalSection
CloseHandle
FindClose
FindResourceA
GetLastError
SetEndOfFile
Sleep
VirtualFree
GetCommandLineA
CreateEventA
GetCPInfo
VirtualQuery
FindFirstFileA
ReadFile
GlobalFindAtomA
ExitProcess
CreateThread
GetFileType
FormatMessageA
GetCurrentThreadId
InitializeCriticalSection
GetFullPathNameA
SetErrorMode
lstrcatA
MulDiv
GetDateFormatA
GetThreadLocale
lstrcpynA
WideCharToMultiByte
DeleteCriticalSection
GetModuleHandleA
GetEnvironmentStrings
GetTickCount
SizeofResource
GlobalDeleteAtom
HeapAlloc
HeapFree
lstrcmpA
SetLastError
GlobalAlloc
LoadLibraryExA
ExitThread
LockResource
LocalAlloc
MoveFileA
GetLocaleInfoA
GetCurrentProcess
lstrlenA
GetACP
GetLocalTime
GetFileSize
FreeResource
WriteFile
msvcrt
memcpy
malloc
strcmp
tan
calloc
user32
CreateIcon
ShowWindow
GetActiveWindow
IsChild
SetCursor
IsWindowEnabled
GetParent
SetWindowPos
IsMenu
GetIconInfo
IsWindowVisible
SetWindowTextA
GetMenuState
GetWindow
CreateWindowExA
GetMessagePos
EqualRect
RegisterClassA
CreateMenu
ShowScrollBar
CheckMenuItem
GetDlgItem
GetClientRect
EnableMenuItem
CallNextHookEx
DefMDIChildProcA
DefFrameProcA
GetDCEx
GetCursor
FrameRect
GetClassInfoA
GetCapture
DrawIcon
CharLowerA
GetScrollRange
GetCursorPos
GetSysColorBrush
DispatchMessageA
CallWindowProcA
TrackPopupMenu
DrawTextA
GetScrollPos
FillRect
GetClassLongA
CharNextA
DispatchMessageW
MessageBoxA
GetScrollInfo
GetMenuStringA
EndPaint
GetMenu
HideCaret
EnumChildWindows
IsDialogMessageA
GetPropA
GetSysColor
GetDC
CreatePopupMenu
DefWindowProcA
Sections
CODE Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ