Static task
static1
Behavioral task
behavioral1
Sample
d5704e470fd66464bf817bcb648a43656000d5014eb03fc6fb4fdc829eae55d0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d5704e470fd66464bf817bcb648a43656000d5014eb03fc6fb4fdc829eae55d0.exe
Resource
win10v2004-20220901-en
General
-
Target
d5704e470fd66464bf817bcb648a43656000d5014eb03fc6fb4fdc829eae55d0
-
Size
832KB
-
MD5
815877698f62594a7a1893bd6f7d2540
-
SHA1
f46fb86aecdcb3ac3a9634fe69c5eef0b15beda0
-
SHA256
d5704e470fd66464bf817bcb648a43656000d5014eb03fc6fb4fdc829eae55d0
-
SHA512
590aab7bed95613bbed6d520515adcd8cdf3f46abe2c0c6e7d098a53625d693f1a2098623eecc30d43501b8c45ac40a1af837f08907deb04c2fddd6d1cd865e1
-
SSDEEP
24576:hEEbc9TBNTJQKmvBrjgzNjkGFLjyAE70sQ5hu4G0BRP:mEb8VRmKg1jiN4GFCAEFQ40Bp
Malware Config
Signatures
Files
-
d5704e470fd66464bf817bcb648a43656000d5014eb03fc6fb4fdc829eae55d0.exe windows x86
c00275a4a563a51c29f49812d4f01080
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetThreadContext
DebugActiveProcess
ResumeThread
GetVersionExA
VirtualProtectEx
SuspendThread
TerminateProcess
GetExitCodeProcess
CreateProcessA
GetModuleFileNameA
WriteProcessMemory
GetStartupInfoA
DeleteFileA
Sleep
GetTempPathA
FindClose
FindNextFileA
FindFirstFileA
UnmapViewOfFile
FreeLibrary
CloseHandle
GetCurrentThread
LoadLibraryA
GetShortPathNameA
GetProcAddress
SetThreadContext
SetFileTime
GetFileTime
ReadFile
ReleaseMutex
MapViewOfFile
CreateFileMappingA
CreateMutexA
SetFilePointer
GetCurrentProcessId
SetLastError
SleepEx
CreateThread
WriteFile
GetDiskFreeSpaceA
GetTempFileNameA
CreateMailslotA
SetEnvironmentVariableA
GetCommandLineA
GetModuleHandleA
GetFileSize
SetPriorityClass
SetThreadPriority
GetCurrentProcess
ContinueDebugEvent
WaitForDebugEvent
ReadProcessMemory
WaitForSingleObject
CreateFileA
GetEnvironmentVariableA
LCMapStringW
GetLastError
SetProcessWorkingSetSize
FlushFileBuffers
GetSystemTime
GetLocalTime
CompareStringW
CompareStringA
LCMapStringA
GetOEMCP
GetACP
SetStdHandle
GetStringTypeW
GetStringTypeA
GetCPInfo
HeapReAlloc
VirtualAlloc
HeapCreate
HeapDestroy
VirtualFree
GetStdHandle
SetHandleCount
GetFileType
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
FreeEnvironmentStringsW
HeapAlloc
HeapFree
RtlUnwind
GetSystemTimeAsFileTime
GetTimeZoneInformation
SetEnvironmentVariableW
MultiByteToWideChar
GetVersion
ExitProcess
user32
EnumWindows
DestroyWindow
SendMessageTimeoutA
GetWindowThreadProcessId
UpdateWindow
SystemParametersInfoA
CreateDialogParamA
TranslateMessage
SetTimer
GetDlgItem
SendMessageA
GetMessageA
EndPaint
IsWindow
BeginPaint
ShowWindow
LoadCursorA
GetSystemMetrics
PostQuitMessage
PostMessageA
KillTimer
RegisterClassA
DefWindowProcA
RegisterWindowMessageA
WaitForInputIdle
CreateWindowExA
MessageBoxA
SetWindowTextA
DispatchMessageA
gdi32
SelectPalette
CreateDCA
RealizePalette
DeleteObject
BitBlt
CreatePalette
CreateCompatibleDC
SelectObject
DeleteDC
CreateDIBitmap
Sections
.text Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ