Static task
static1
Behavioral task
behavioral1
Sample
54df21c22fcb724e0f495a16503386a60f3e66ff0eadca0a04c376afe85fe96d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
54df21c22fcb724e0f495a16503386a60f3e66ff0eadca0a04c376afe85fe96d.exe
Resource
win10v2004-20220812-en
General
-
Target
54df21c22fcb724e0f495a16503386a60f3e66ff0eadca0a04c376afe85fe96d
-
Size
85KB
-
MD5
6bdd9504c65e43faf2ee131c478dd680
-
SHA1
db43e7322d4a1ca7ea857f13aba46828e0391581
-
SHA256
54df21c22fcb724e0f495a16503386a60f3e66ff0eadca0a04c376afe85fe96d
-
SHA512
35dee261ab86efb4be633dbc1224939c27c820bbf30227d5ed8d2dfd37c2d29ab8faa344d29f45747b104167fb9666a4bb38ae98aa24749967242487a8cc1c98
-
SSDEEP
1536:dQZlfuVVjtydlK2werzZxY8DFym28Q25:dQ/4Vj8Gerzw8DgMQ2
Malware Config
Signatures
Files
-
54df21c22fcb724e0f495a16503386a60f3e66ff0eadca0a04c376afe85fe96d.exe windows x86
cdd600dcb191c0ca98a4b768f83a5ecb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
SetEndOfFile
ResumeThread
HeapSize
SuspendThread
CreateDirectoryA
GetDriveTypeA
GlobalSize
GetLocaleInfoA
GetCommandLineA
GetFileAttributesW
ResumeThread
GetStdHandle
GetPriorityClass
GetProcessHeap
IsBadReadPtr
WriteFile
ReadConsoleW
CreatePipe
VirtualProtect
DeleteFileA
user32
PeekMessageA
DestroyIcon
DestroyMenu
GetWindowLongA
SetCursor
DispatchMessageA
wsprintfA
GetWindowLongA
GetWindowTextW
SetRect
GetScrollInfo
DrawIcon
LoadCursorA
els
DllGetClassObject
DllCanUnloadNow
DllUnregisterServer
DllRegisterServer
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE