Static task
static1
Behavioral task
behavioral1
Sample
39f2dd6ef3d8690f1e5f00ecf48f00d7aa9fedb866afc2e61c37e181f9479589.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
39f2dd6ef3d8690f1e5f00ecf48f00d7aa9fedb866afc2e61c37e181f9479589.exe
Resource
win10v2004-20220812-en
General
-
Target
39f2dd6ef3d8690f1e5f00ecf48f00d7aa9fedb866afc2e61c37e181f9479589
-
Size
418KB
-
MD5
71738f8344779c55dc4c513a3e1498b0
-
SHA1
550f466f4e68ed52d60fd6b85a6ca8ec20be9c85
-
SHA256
39f2dd6ef3d8690f1e5f00ecf48f00d7aa9fedb866afc2e61c37e181f9479589
-
SHA512
d3946e4b3b16359799ae06f266ce0c377a942054933d38829866162854e8240ddb86090b1ab1e2562a3eed9cc4b91ea925e7116ab96c62c5c119d78fab212ddd
-
SSDEEP
6144:3DNuqJ/zOmPS5iTaMjZVFLLz3HTQBYLDcML+iPZn:3Dl7O/iTRjvFLLLJ6ih
Malware Config
Signatures
Files
-
39f2dd6ef3d8690f1e5f00ecf48f00d7aa9fedb866afc2e61c37e181f9479589.exe windows x86
ad5776c0de1a9474a653890cc41a5351
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
EnterCriticalSection
GetCurrentProcessId
FindAtomW
ReadFile
CreateMailslotA
GetPrivateProfileStringW
GlobalFree
EnumCalendarInfoW
GetFileAttributesA
SetEvent
SuspendThread
GetCurrentThreadId
GetDriveTypeW
HeapCreate
SetLastError
GetModuleFileNameA
GetConsoleAliasW
FindClose
LocalFree
user32
GetSysColor
GetClientRect
IsWindow
GetClassInfoA
GetKeyState
GetMenuInfo
SetFocus
CallWindowProcW
GetCursorInfo
GetKeyboardType
DrawTextW
DispatchMessageA
DispatchMessageA
avicap32
videoThunk32
videoThunk32
videoThunk32
videoThunk32
videoThunk32
desk.cpl
DeskSetCurrentScheme
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 304KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 408KB - Virtual size: 407KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ