Static task
static1
Behavioral task
behavioral1
Sample
93838768a5c4b39c519bfcf33daeffa0374bc3377424ec7d288ae2fce73397c7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
93838768a5c4b39c519bfcf33daeffa0374bc3377424ec7d288ae2fce73397c7.exe
Resource
win10v2004-20220812-en
General
-
Target
93838768a5c4b39c519bfcf33daeffa0374bc3377424ec7d288ae2fce73397c7
-
Size
85KB
-
MD5
4e627fd5fc4c3e83d22c45f0257b8020
-
SHA1
9c20f3ee0306df1228702f93c860b7c1e36551cc
-
SHA256
93838768a5c4b39c519bfcf33daeffa0374bc3377424ec7d288ae2fce73397c7
-
SHA512
5c8142e2d5691683f89e5ccaff6b35664d62aa5baa004294632ab5ff1c52bac715a455b6d5be9b3383b57542fc31ab83700eb1932904d8938a10192b4eb08873
-
SSDEEP
1536:2m1zxn3Z8zsP4vdoHPpvUrA5t0r7h1l/jqo:1xn3Zpw1oHPpv3MVuo
Malware Config
Signatures
Files
-
93838768a5c4b39c519bfcf33daeffa0374bc3377424ec7d288ae2fce73397c7.exe windows x86
1720b682e107bc352968eb1f284f171e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryA
GetStartupInfoW
GetDriveTypeA
GetFileTime
InterlockedExchange
GetModuleFileNameA
GetProcessHeap
CreateFileW
GlobalLock
GetConsoleMode
DeleteFileW
GetFileAttributesA
CancelIo
FindAtomA
GetModuleHandleA
GetLocalTime
DeleteFileW
CreateFileW
GetCurrentThreadId
VirtualProtect
HeapDestroy
LocalFree
LeaveCriticalSection
GetConsoleAliasW
ReadConsoleW
user32
IsWindowEnabled
DispatchMessageA
GetWindowLongA
MessageBoxA
GetWindowLongA
wsprintfA
IsZoomed
GetSysColor
PeekMessageA
GetWindowDC
GetKeyState
LoadCursorA
GetWindowTextA
davclnt
NPCloseEnum
DllGetClassObject
DllCanUnloadNow
NPGetCaps
advapi32
IsValidSid
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE