Static task
static1
Behavioral task
behavioral1
Sample
d12336892d9537ee70bbbc0f97c3238a209cad3422c15b30370a518080d55666.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d12336892d9537ee70bbbc0f97c3238a209cad3422c15b30370a518080d55666.exe
Resource
win10v2004-20220901-en
General
-
Target
d12336892d9537ee70bbbc0f97c3238a209cad3422c15b30370a518080d55666
-
Size
14KB
-
MD5
77ee0744ae47c831e78a37d6a537062d
-
SHA1
0a43a5ced7564c97e7e30a79279b4c3fba807f77
-
SHA256
d12336892d9537ee70bbbc0f97c3238a209cad3422c15b30370a518080d55666
-
SHA512
9726f57eadece6162d6baa9c38fc35f2fd2c98ddb82607199a476edb98b210dec83da00b4190c334b2902daf30856377e5bf65f2c47d8774af6634e81cfc5e9c
-
SSDEEP
192:7sDeGATxD4b0/iaHPJPxPXPiPZPQPhprAkGZb0uTziUeMkMFy+ZATWk+M0ECbrbT:7sDina2IbzHe+FPZATWkRLy
Malware Config
Signatures
Files
-
d12336892d9537ee70bbbc0f97c3238a209cad3422c15b30370a518080d55666.exe windows x86
912f62b527641265e2551cc08c982215
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
fputws
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__initenv
exit
_cexit
_XcptFilter
_exit
_c_exit
_wsetlocale
_strnicmp
isdigit
atoi
wcslen
wcschr
_iob
_except_handler3
advapi32
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
CloseServiceHandle
OpenServiceW
OpenSCManagerW
RegCloseKey
kernel32
GetProcAddress
GetLastError
LoadLibraryW
FreeLibrary
FormatMessageW
LocalFree
LocalAlloc
MultiByteToWideChar
lstrcmpiA
GetModuleHandleA
GetModuleFileNameW
user32
wsprintfW
ole32
CoCreateInstanceEx
CoInitializeEx
CoUninitialize
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ