Static task
static1
Behavioral task
behavioral1
Sample
dbe6f87099b14308c5628ba213daea6b94309b3301ef049080331bffc335147e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dbe6f87099b14308c5628ba213daea6b94309b3301ef049080331bffc335147e.exe
Resource
win10v2004-20220812-en
General
-
Target
dbe6f87099b14308c5628ba213daea6b94309b3301ef049080331bffc335147e
-
Size
442KB
-
MD5
60505c52f87f3fe93793070a5deb0740
-
SHA1
7db5aa00836a956bf3676c998716141736632f54
-
SHA256
dbe6f87099b14308c5628ba213daea6b94309b3301ef049080331bffc335147e
-
SHA512
d17d94564805fa3c5dfd4f70c7e6f8b61ca0d159a158b81164485e63412c2dd1d427ca00a9a6a0cf9d5ddc1610b212fd22a30e9142d6bb7719db09afbcb7cc28
-
SSDEEP
12288:i6dvt6bNkz6vQ/ZVEKvyugpp/E4VvXBfnJ17x0FkqY:iavwNsP/ZVXQEkvv1lvL
Malware Config
Signatures
Files
-
dbe6f87099b14308c5628ba213daea6b94309b3301ef049080331bffc335147e.exe windows x86
4527800737be10532f35670699f95ae4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnregisterWaitEx
GetCurrentProcess
ntdll
RtlActivateActivationContextUnsafeFast
oleaut32
VarUI2FromI1
user32
GetDesktopWindow
GetClipboardOwner
GetRawInputBuffer
Sections
.text Size: 435KB - Virtual size: 436KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 202B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE