Static task
static1
Behavioral task
behavioral1
Sample
dd32e0938ce19aedfce11a8fe5204054a18d0ab83faa2b1b162907095d5303f1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
dd32e0938ce19aedfce11a8fe5204054a18d0ab83faa2b1b162907095d5303f1.exe
Resource
win10v2004-20220812-en
General
-
Target
dd32e0938ce19aedfce11a8fe5204054a18d0ab83faa2b1b162907095d5303f1
-
Size
65KB
-
MD5
80739db464b682a16fa0b574a859e930
-
SHA1
e56427cdb361f7a62325ef49c6c63ffdbe16d6ef
-
SHA256
dd32e0938ce19aedfce11a8fe5204054a18d0ab83faa2b1b162907095d5303f1
-
SHA512
8301f32cc395c12cae775f01459cfdfd53dc20dc5d4d04d6aa1d2fefc4b09d723b5170f8c0ce788d217267e9ed75d173d297ce0fa6c833d887fbf355e5993004
-
SSDEEP
768:M0Jj0Hkfcs4kqxErQHyo9diG/nJ25bVdgLa1XFnToIf1XHE6Pdm:M0ZCk2yo9diGPQALatFnToIffPdm
Malware Config
Signatures
Files
-
dd32e0938ce19aedfce11a8fe5204054a18d0ab83faa2b1b162907095d5303f1.exe windows x86
3bf27b83e0c98731800c31d3281c474f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
Process32Next
Module32First
Process32First
CreateToolhelp32Snapshot
TerminateProcess
OpenProcess
ExitProcess
CopyFileA
DeleteFileA
CreateThread
lstrcmpiA
WaitForSingleObject
MoveFileA
GetFileSize
CreateFileA
WriteFile
GetLogicalDriveStringsA
GetShortPathNameA
GetVersionExA
GetComputerNameA
GetTickCount
HeapAlloc
GetProcessHeap
GetCurrentProcessId
GetModuleHandleA
VirtualAlloc
VirtualQueryEx
ReadProcessMemory
GetThreadContext
SetThreadContext
WriteProcessMemory
VirtualProtectEx
VirtualFree
GetCurrentThreadId
GetEnvironmentVariableA
GlobalAlloc
LoadLibraryExA
GlobalFree
DeviceIoControl
lstrcpyA
lstrcatA
GetCurrentProcess
SetPriorityClass
GetCurrentThread
SetThreadPriority
ResumeThread
SetFileAttributesA
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLastError
ReadFile
FindNextFileA
FindClose
GetDriveTypeA
CreatePipe
GetStartupInfoA
GetSystemDirectoryA
CreateProcessA
CloseHandle
Sleep
GlobalMemoryStatus
user32
wsprintfA
MessageBoxA
GetSystemMetrics
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
CloseWindowStation
CloseDesktop
GetProcessWindowStation
GetDesktopWindow
SetCursorPos
keybd_event
ExitWindowsEx
mouse_event
gdi32
GetDIBits
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCA
DeleteDC
DeleteObject
advapi32
AdjustTokenPrivileges
DeleteService
OpenSCManagerA
CreateServiceA
OpenServiceA
CloseServiceHandle
StartServiceA
RegisterServiceCtrlHandlerA
SetServiceStatus
LookupPrivilegeValueA
OpenProcessToken
StartServiceCtrlDispatcherA
ControlService
shell32
ShellExecuteA
SHGetFileInfoA
msvcrt
_acmdln
puts
printf
_strlwr
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
free
sprintf
strncpy
??2@YAPAXI@Z
__CxxFrameHandler
atoi
strcspn
strstr
??3@YAXPAX@Z
_ftol
fclose
fprintf
fopen
rand
memmove
malloc
__dllonexit
_onexit
_exit
_XcptFilter
exit
ws2_32
WSAStartup
setsockopt
sendto
htonl
WSASocketA
htons
socket
closesocket
recv
shutdown
inet_addr
gethostbyname
send
connect
Sections
.text Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ