Static task
static1
Behavioral task
behavioral1
Sample
d0e547f2779f326dc315354d10fffeee75a3ec70aacab32848bc11e44c935de5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d0e547f2779f326dc315354d10fffeee75a3ec70aacab32848bc11e44c935de5.exe
Resource
win10v2004-20220812-en
General
-
Target
d0e547f2779f326dc315354d10fffeee75a3ec70aacab32848bc11e44c935de5
-
Size
547KB
-
MD5
6429a1bc1da247dcc4f29b23729615f0
-
SHA1
a03512de1496a4c98d3efd467582b9b413520e32
-
SHA256
d0e547f2779f326dc315354d10fffeee75a3ec70aacab32848bc11e44c935de5
-
SHA512
269ac352f40afc1a9a1f216c726280bd2a3fdd8c25a02ba6cb4b9c3df709a6e694a4aabd66c637d198d3df3a93bdb5cc30146f62166232af4e39b5763c9e8470
-
SSDEEP
12288:QTx5KRZ18xtSP+szdcIugOO50MMEMOkP:ZmxtSP+sJ+O5FWPP
Malware Config
Signatures
Files
-
d0e547f2779f326dc315354d10fffeee75a3ec70aacab32848bc11e44c935de5.exe windows x86
ec355f648ad7b17a05b0e2b03dbd1d86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
kernel32
lstrlenW
LocalFree
GetFileAttributesW
ExpandEnvironmentStringsW
GetProcessHeap
FreeLibrary
GetProcAddress
GetLastError
HeapSetInformation
GetCommandLineW
InterlockedCompareExchange
LoadLibraryA
HeapFree
LoadLibraryW
WideCharToMultiByte
LocalAlloc
IsDBCSLeadByte
RegisterApplicationRestart
lstrlenA
HeapAlloc
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoA
Sleep
InterlockedExchange
DelayLoadFailureHook
gdi32
GetStockObject
user32
CreateWindowExW
MessageBoxW
LoadCursorW
DefWindowProcW
PostQuitMessage
RegisterClassW
LoadIconW
LoadStringW
msvcrt
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_adjust_fdiv
_XcptFilter
_exit
_cexit
__getmainargs
memset
__p__commode
__set_app_type
_ismbblead
memcpy
?terminate@@YAXXZ
_except_handler4_common
__p__fmode
_controlfp
shell32
CommandLineToArgvW
shlwapi
StrCmpIW
PathRemoveFileSpecW
PathFindExtensionW
StrCmpNIW
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 488KB - Virtual size: 487KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 45KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE