Static task
static1
Behavioral task
behavioral1
Sample
da6889fbf0c91c93cc0f9d455af90cea727d63921582adb0da007090f79fd926.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
da6889fbf0c91c93cc0f9d455af90cea727d63921582adb0da007090f79fd926.exe
Resource
win10v2004-20220901-en
General
-
Target
da6889fbf0c91c93cc0f9d455af90cea727d63921582adb0da007090f79fd926
-
Size
42KB
-
MD5
3dd100f8a1f3f0af909de864d1d73f50
-
SHA1
269e694fc3acee4bd7db37acfb9d215bdf946264
-
SHA256
da6889fbf0c91c93cc0f9d455af90cea727d63921582adb0da007090f79fd926
-
SHA512
498a308ece39178140936448d6d7d8c8bf20d0bb4910b6dc67966ffc0a80d0ade3e1f65b181475ad24e118a4e669d6878a6a209b4b34d60d1fc7af163879f49c
-
SSDEEP
768:ag+ui/tfhKfitqiH970FqCMROtfgd9LVp+68qS94bR2vkD0:MuAhCFqCMROs1pD0
Malware Config
Signatures
Files
-
da6889fbf0c91c93cc0f9d455af90cea727d63921582adb0da007090f79fd926.exe windows x86
5900068b46e9a58eb0bafafafe2f6fb2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__initenv
_cexit
_XcptFilter
_exit
_c_exit
sprintf
setlocale
printf
exit
wprintf
advapi32
RegSetValueExW
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
kernel32
SetThreadLocale
GetCurrentProcess
GetProcessAffinityMask
GetUserDefaultLCID
SetThreadAffinityMask
GetVersionExW
FormatMessageW
GetConsoleOutputCP
SetConsoleOutputCP
GetOEMCP
GetCurrentThread
GetModuleHandleA
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 68B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mzjmxik Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE