Static task
static1
Behavioral task
behavioral1
Sample
d2c99e7437a7e986169d1184493cfdaa56eb919b7cfb5f7389a8ce7626297165.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d2c99e7437a7e986169d1184493cfdaa56eb919b7cfb5f7389a8ce7626297165.exe
Resource
win10v2004-20220901-en
General
-
Target
d2c99e7437a7e986169d1184493cfdaa56eb919b7cfb5f7389a8ce7626297165
-
Size
853KB
-
MD5
70032de455f1a9f0a4304b1c20a0ec40
-
SHA1
8522e91475edb1745d2a287fe1885ee73101bee2
-
SHA256
d2c99e7437a7e986169d1184493cfdaa56eb919b7cfb5f7389a8ce7626297165
-
SHA512
3ac8c3aec5a977a083661f3860c0cb84c59cc1f8733c60c33ba6274cef3838d77ce4d68dd06759f4d7e79b4438b8de610088b4d0f5301b780cf7cfe84c8ed615
-
SSDEEP
12288:D3Uge2+VZW1nGRdGNCRwznco3Mncsjw8yclOKoJelGYbFzbSt31Uw:DyjzmGRdSKLo8cQwQDGeMYZvS0w
Malware Config
Signatures
Files
-
d2c99e7437a7e986169d1184493cfdaa56eb919b7cfb5f7389a8ce7626297165.exe windows x86
fa1a29de515155a9034814cdae86d239
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetProcessTimes
GetPriorityClass
ReadFile
IsBadCodePtr
CreateMailslotW
GetCommandLineA
DeleteAtom
GetEnvironmentVariableA
GetFileAttributesA
HeapCreate
GetCommandLineA
CloseHandle
DeleteFileW
FindAtomA
GetModuleFileNameA
GetStartupInfoA
HeapDestroy
GetStdHandle
SuspendThread
user32
GetSysColor
GetWindowLongA
GetWindowInfo
DrawTextW
DispatchMessageA
DispatchMessageA
SetFocus
IsZoomed
FindWindowA
GetClassInfoA
CallWindowProcW
DestroyMenu
GetKeyState
DestroyMenu
ntlanman
NPGetCaps
NPGetCaps
NPGetCaps
NPGetCaps
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 843KB - Virtual size: 871KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
uuhnbjh Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE