Static task
static1
Behavioral task
behavioral1
Sample
d7cf9a9263eea817210c189f00a86ad6c9ba903756f96986ed71c7ca06acd5ff.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d7cf9a9263eea817210c189f00a86ad6c9ba903756f96986ed71c7ca06acd5ff.exe
Resource
win10v2004-20220901-en
General
-
Target
d7cf9a9263eea817210c189f00a86ad6c9ba903756f96986ed71c7ca06acd5ff
-
Size
35KB
-
MD5
7cb183755f3ea25107055501448d045c
-
SHA1
957c1accb845957e646fb158e47594c0b58493f0
-
SHA256
d7cf9a9263eea817210c189f00a86ad6c9ba903756f96986ed71c7ca06acd5ff
-
SHA512
476f5aac3da05e30517f4a49669ff2de4a7c2f938a551bb248371f123ca08a0c370017e1da4241be1a95c08d767e7280934e0c12bb42e7941ccd26320021ceff
-
SSDEEP
768:+a8D4/gJ6z9VGr2kjwfMluEo5ZGM+ENmY8S6aDy3E1iunqnx8O:+FjJG9VGrvx6AMcGDAvx8O
Malware Config
Signatures
Files
-
d7cf9a9263eea817210c189f00a86ad6c9ba903756f96986ed71c7ca06acd5ff.exe windows x86
683aa1569ed33db19c5808569b6c859e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasW
SetEvent
ResumeThread
LocalFree
GetPrivateProfileStringW
GetModuleHandleA
ReadFile
FindAtomW
GetCurrentProcessId
HeapCreate
GetDriveTypeW
lstrlenW
FindClose
GetNumberFormatW
GetCurrentThreadId
EnumCalendarInfoW
EnterCriticalSection
SetLastError
TlsGetValue
GetModuleFileNameA
user32
SetFocus
DispatchMessageA
GetKeyState
IsWindow
DispatchMessageA
CallWindowProcW
GetSysColor
GetMenuInfo
GetCursorInfo
GetClassInfoA
GetKeyboardType
DrawTextW
GetClientRect
wsnmp32
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
msasn1
ASN1BERDecBool
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ