Static task
static1
Behavioral task
behavioral1
Sample
d123aedc7f2091798d0b9b8198b3780719b49b5fe856257875627ff6893ec28c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d123aedc7f2091798d0b9b8198b3780719b49b5fe856257875627ff6893ec28c.exe
Resource
win10v2004-20220812-en
General
-
Target
d123aedc7f2091798d0b9b8198b3780719b49b5fe856257875627ff6893ec28c
-
Size
381KB
-
MD5
90db4a08c8d9e41d47462c17355716d3
-
SHA1
53ec01bfb2a88513feb009a5066ffa8334c20517
-
SHA256
d123aedc7f2091798d0b9b8198b3780719b49b5fe856257875627ff6893ec28c
-
SHA512
09bf9f0e27f8f1fa2e02182497d9e53a3e246870103c98be881fd21a6aa7b67b0b5b765d1a507e866e8c219306f0d233544aa908a694fe336bdd6a0caceb3d43
-
SSDEEP
6144:ywZuRkRMu7t0HEAT1fxhcMxW2pL7lv6w2K/PkFtR6sFHYnHFWhTyHVEOSQTQiJYs:ywQRkRMuGHEAJLjpFv6w2K/PkFtlVMHI
Malware Config
Signatures
Files
-
d123aedc7f2091798d0b9b8198b3780719b49b5fe856257875627ff6893ec28c.exe windows x86
7acf795f7b5a4b78eb275530d129e096
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
FindClose
ReleaseMutex
GetCurrentThreadId
GlobalFlags
HeapCreate
InitializeCriticalSection
GetPrivateProfileStringA
CloseHandle
GetCurrentProcessId
WriteFile
LocalFree
LoadLibraryW
CreateEventW
lstrlenW
ReleaseMutex
GetFileTime
IsBadStringPtrW
GetEnvironmentVariableW
TlsGetValue
user32
GetClientRect
DispatchMessageA
IsWindow
SetFocus
CallWindowProcW
CreateWindowExA
GetSysColor
GetSysColor
GetClassInfoA
DrawTextA
GetKeyboardType
EndDialog
DrawStateW
pnrpnsp
NSPStartup
NSPStartup
NSPStartup
NSPStartup
NSPStartup
advapi32
InitializeSid
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 371KB - Virtual size: 370KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ