Static task
static1
Behavioral task
behavioral1
Sample
dd79f5ab370a6de15c4f7326816b2cefadaec5b919f60460d4b0f8a296b59ec3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
dd79f5ab370a6de15c4f7326816b2cefadaec5b919f60460d4b0f8a296b59ec3.exe
Resource
win10v2004-20220812-en
General
-
Target
dd79f5ab370a6de15c4f7326816b2cefadaec5b919f60460d4b0f8a296b59ec3
-
Size
303KB
-
MD5
349d50eaf8a2531551615f0f0eff5230
-
SHA1
e4e5e09ccf1284b657f0b5bdda7adda8df93b94e
-
SHA256
dd79f5ab370a6de15c4f7326816b2cefadaec5b919f60460d4b0f8a296b59ec3
-
SHA512
3f65b3d2f98ac43fc5105e3da1ebc179ea75a2b6981a4987de406cd35dd5fe356aa946f8bf7905d1a018fbf484338ef4e1ce8d8df35d54a926d7eea6465dc166
-
SSDEEP
6144:DMzbHRDI03hk81AxEdcxsb4lUiT03ZP4UE84Xh0ffkuoga:gPRD9a8O13fD8UPTg
Malware Config
Signatures
Files
-
dd79f5ab370a6de15c4f7326816b2cefadaec5b919f60460d4b0f8a296b59ec3.exe windows x86
8e1796795fd5d787f300f2ce74dc2c71
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetLocaleInfoA
IsBadReadPtr
GetModuleHandleA
GetStdHandle
DeleteFileA
SuspendThread
ResumeThread
CreatePipe
GlobalSize
ReadConsoleA
SetEndOfFile
WriteFile
HeapSize
ResumeThread
GetPriorityClass
CreateDirectoryA
GetFileAttributesW
VirtualProtect
GetCommandLineA
GetDriveTypeA
GetProcessHeap
user32
GetWindowLongA
GetScrollInfo
LoadCursorA
GetWindowLongA
PeekMessageA
DestroyMenu
SetRect
DrawIcon
DispatchMessageA
wsprintfA
GetWindowTextW
DestroyIcon
SetCursor
els
DllGetClassObject
DllCanUnloadNow
DllRegisterServer
DllUnregisterServer
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 296KB - Virtual size: 295KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE