Static task
static1
Behavioral task
behavioral1
Sample
d00335507b3b3033c2f60fe4979eac40fbdc54b6c1618ad90c124a8565f43e67.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d00335507b3b3033c2f60fe4979eac40fbdc54b6c1618ad90c124a8565f43e67.exe
Resource
win10v2004-20220812-en
General
-
Target
d00335507b3b3033c2f60fe4979eac40fbdc54b6c1618ad90c124a8565f43e67
-
Size
375KB
-
MD5
904edcfa09292328455ee58836143c3b
-
SHA1
4deed22bd2c5a835196ff2b5661e8b80e40cf34a
-
SHA256
d00335507b3b3033c2f60fe4979eac40fbdc54b6c1618ad90c124a8565f43e67
-
SHA512
9903d865b00abd9887decd4544ac15c183a507ef02f51c1af720cc2d99542a14c716156d919eb4ba39a95395eb9a310eb21af910d98aecba95866dfec3b8499d
-
SSDEEP
6144:KVXGYtc7MowT2eFdOywz7HUIAo92MG5uSa9kMFgjKZCyLgNwP91fCkUOxKrNLLAD:8OAowRFd/wP08AMG5uPzFgjm9LgK9KVO
Malware Config
Signatures
Files
-
d00335507b3b3033c2f60fe4979eac40fbdc54b6c1618ad90c124a8565f43e67.exe windows x86
3f9060fa9600d440f4bde0fe31bdd19e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
UnmapViewOfFile
lstrlenA
LocalFree
HeapCreate
lstrcatA
GetComputerNameA
GetSystemTime
GetModuleHandleA
SetLastError
LocalUnlock
GetTickCount
Sleep
SetEvent
GetCommandLineW
GetCurrentDirectoryA
CreateThread
CloseHandle
PulseEvent
LoadLibraryW
user32
GetDlgItem
CheckRadioButton
DrawEdge
FillRect
DrawMenuBar
CreateWindowExA
GetKeyState
DispatchMessageA
CallWindowProcA
SetFocus
IsWindow
GetDC
GetScrollBarInfo
clbcatq
SetSetupOpen
SetupOpen
UpdateFromAppChange
CheckMemoryGates
DowngradeAPL
timedate.cpl
CPlApplet
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 764KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ