Static task
static1
Behavioral task
behavioral1
Sample
d3b893b74bd0bdafeecf9b2aa9973561455488f4fe813945f2871cea051411ba.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d3b893b74bd0bdafeecf9b2aa9973561455488f4fe813945f2871cea051411ba.exe
Resource
win10v2004-20220812-en
General
-
Target
d3b893b74bd0bdafeecf9b2aa9973561455488f4fe813945f2871cea051411ba
-
Size
372KB
-
MD5
a0f73c1f879dc29cada18ec2ab955120
-
SHA1
e7d5e61a07757a400896134edf086f135cfc990b
-
SHA256
d3b893b74bd0bdafeecf9b2aa9973561455488f4fe813945f2871cea051411ba
-
SHA512
0e20a8efcfca2b11cce614e8a35b85b472b6feb7abf271902ddba0cbf3f902f2f0a0ef910c44c30345fe5e30c9672d8593f89aa79ec4c67a9acffe6505c99412
-
SSDEEP
6144:V+wcttwieKo+NRgGhFRmyZtzZ8n41RwR7CUVyWxuJJUfaI4nI:0wmxbfzRDPuneRwR7CUgJJUfaIa
Malware Config
Signatures
Files
-
d3b893b74bd0bdafeecf9b2aa9973561455488f4fe813945f2871cea051411ba.exe windows x86
12e2c7bf2e66be46dde21c8fc34d208c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForDebugEvent
FlushFileBuffers
SystemTimeToTzSpecificLocalTime
GetModuleFileNameW
SetTapeParameters
ReleaseSemaphore
lstrcpyA
SetConsoleOutputCP
lstrcpynA
GetFileAttributesA
GetStartupInfoW
FindFirstVolumeMountPointA
OpenProcess
RegisterWaitForInputIdle
PeekConsoleInputA
FlushInstructionCache
GetCommandLineW
GetPrivateProfileStructA
UnlockFileEx
Sleep
WritePrivateProfileStructA
WriteFileEx
UpdateResourceA
OpenMutexA
GetEnvironmentVariableA
GetProfileStringA
GetCurrentProcess
GetDllDirectoryA
ClearCommError
AddAtomA
GetDriveTypeA
OpenEventA
VirtualAlloc
GetLocaleInfoA
GetProcessWorkingSetSize
_hread
GetThreadPriorityBoost
advapi32
RegDeleteKeyA
GetEffectiveRightsFromAclA
user32
ScrollWindow
LockWindowUpdate
RealGetWindowClassA
SetWindowPlacement
GrayStringA
DrawMenuBar
IsMenu
GetClassInfoA
MapVirtualKeyExA
SetDlgItemInt
ShowWindowAsync
DragDetect
IsDialogMessageA
TranslateAcceleratorA
MenuWindowProcA
EnumDisplaySettingsExA
GetTaskmanWindow
CharUpperBuffW
AllowForegroundActivation
GetKeyboardLayoutNameA
DestroyCaret
ScreenToClient
GetScrollBarInfo
MonitorFromRect
EnumDisplayDevicesA
SetKeyboardState
GetWindowInfo
GetWindowTextA
GetDC
GetQueueStatus
SetProgmanWindow
SetMenuDefaultItem
LoadKeyboardLayoutA
CalcMenuBar
SetDebugErrorLevel
GetMessagePos
LoadIconA
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 358KB - Virtual size: 681KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ