Static task
static1
Behavioral task
behavioral1
Sample
dc90c46aab7fefd5f4b7f3327a89a2a82757088e5358ce12da3cb1e961364b0c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dc90c46aab7fefd5f4b7f3327a89a2a82757088e5358ce12da3cb1e961364b0c.exe
Resource
win10v2004-20220901-en
General
-
Target
dc90c46aab7fefd5f4b7f3327a89a2a82757088e5358ce12da3cb1e961364b0c
-
Size
643KB
-
MD5
4f194d77ed53f7bdb3b67c005e536c10
-
SHA1
b54d11c91afeb0ed607070bfd5f6e3277d889780
-
SHA256
dc90c46aab7fefd5f4b7f3327a89a2a82757088e5358ce12da3cb1e961364b0c
-
SHA512
81b1a41f0eee779bd76145a4690bf832256ccdfa52c23aaf4e06983e6fc8bfec8c07a35c6fa71acc036a23ad6ba0039e2b83a17f89d2d90a553ac32bd1175644
-
SSDEEP
12288:34jRzTl5a8P0IrRCqyww6u9HFREWjQrp4rSygyGo4UqFenKMAYnVRf:wvVRCq5wzH8egpk1gyGo43EKMA4f
Malware Config
Signatures
Files
-
dc90c46aab7fefd5f4b7f3327a89a2a82757088e5358ce12da3cb1e961364b0c.exe windows x86
875666ad2f30ace9c1b97fa5f8c9272f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
sysdm.cpl
DisplaySYSDMCPL
kernel32
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
Sleep
InterlockedExchange
UnhandledExceptionFilter
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 888B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 564KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE