Static task
static1
Behavioral task
behavioral1
Sample
d430143cccdc12cf49c998d4bd94025807d10ef011c7d49e854ef62168bf75f2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d430143cccdc12cf49c998d4bd94025807d10ef011c7d49e854ef62168bf75f2.exe
Resource
win10v2004-20220812-en
General
-
Target
d430143cccdc12cf49c998d4bd94025807d10ef011c7d49e854ef62168bf75f2
-
Size
336KB
-
MD5
3d0be4e19d05a5734817e698565c658a
-
SHA1
22736c36e56abc0a0a084c67e9ba84153a2413b9
-
SHA256
d430143cccdc12cf49c998d4bd94025807d10ef011c7d49e854ef62168bf75f2
-
SHA512
2eae401b7a85957693ed290c570e423aef3eeccc1208bdbe32bc3b473065955e814e29e89032ba27f46f4afa190a78e5916fe1c3bf501423927c1a6d8cf58f4f
-
SSDEEP
6144:+9ygZad4QorPBkNjBe45i0yXjtHVfx9Qzed/pBFBGctT0kn/7j:+Y/ojSu45toj72a/p1Guj/7j
Malware Config
Signatures
Files
-
d430143cccdc12cf49c998d4bd94025807d10ef011c7d49e854ef62168bf75f2.exe windows x86
b755ddc8a4ef992b89b9d56aa1fbb651
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
SuspendThread
CreateThread
FreeResource
SizeofResource
LockResource
LoadResource
VirtualProtect
VirtualFree
Sleep
GetLastError
VirtualAlloc
GetProcAddress
VirtualQuery
SetLastError
ResumeThread
CreateFileA
LoadLibraryA
GetSystemTime
WaitForMultipleObjects
GlobalFree
ReadFile
GetSystemInfo
LocalFree
LocalAlloc
FreeLibrary
CreateFileMappingA
DeleteFileA
FlushViewOfFile
WriteFile
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetStringTypeW
HeapReAlloc
HeapAlloc
CloseHandle
GetProcessHeap
GlobalAlloc
HeapFree
GetOEMCP
GetACP
GetCPInfo
RtlUnwind
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
user32
IsWindow
DefWindowProcA
GetDesktopWindow
ReleaseDC
GetIconInfo
GetDC
ShowCaret
gdi32
CreatePenIndirect
CreateCompatibleBitmap
GetDIBits
pdh
PdhAddCounterA
PdhOpenQueryA
PdhCollectQueryData
Sections
.text Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 248KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 384B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ibose Size: 17KB - Virtual size: 333KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.istd Size: 1024B - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE