Static task
static1
Behavioral task
behavioral1
Sample
acce1dfde0103d2bdccc3451d9b997db7969d620bf692d3504a677b466184b51.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
acce1dfde0103d2bdccc3451d9b997db7969d620bf692d3504a677b466184b51.exe
Resource
win10v2004-20220812-en
General
-
Target
acce1dfde0103d2bdccc3451d9b997db7969d620bf692d3504a677b466184b51
-
Size
268KB
-
MD5
4cc5524f89ca84f1d33bcff5569d744e
-
SHA1
3b4b36f5b66d2e1df6975b1821b0f76f82bbf03e
-
SHA256
acce1dfde0103d2bdccc3451d9b997db7969d620bf692d3504a677b466184b51
-
SHA512
854d57dca9783b27c88b73bfc934f8144b01a32cf317180baafdf55b528bf3721b4f94fab8ae46ea8d4f411af93e77257beeb896725cce646e5b2d4706257191
-
SSDEEP
3072:7Dk6alPdPKl6y1JYbV4JEKaGKAnxMblqej+hQKRymZxcMtQi8V5CRaGGL6aHy:Eg0SElvAnKl4ZIExcGQiE58ab
Malware Config
Signatures
Files
-
acce1dfde0103d2bdccc3451d9b997db7969d620bf692d3504a677b466184b51.exe windows x86
6ac762b939430f558947c51066744712
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadMenuW
IsDialogMessageW
LoadIconA
LoadBitmapA
GetMessageW
InsertMenuA
LoadCursorA
DrawStateA
PostMessageW
FindWindowA
wsprintfA
DialogBoxParamA
DispatchMessageW
IsZoomed
PeekMessageW
shell32
DragQueryPoint
SHCreateShellItem
SHFree
DragQueryFileA
SHGetFileInfoA
FindExecutableA
StrChrA
SHGetMalloc
SHGetDiskFreeSpaceA
ShellMessageBoxA
DragAcceptFiles
DragFinish
SHFileOperationA
kernel32
GetDriveTypeA
Sleep
HeapSize
GetLogicalDriveStringsW
GetModuleHandleA
GetDiskFreeSpaceA
LoadLibraryW
GetNumberFormatW
CreateDirectoryA
VirtualProtect
MapViewOfFile
GetDateFormatW
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 184KB - Virtual size: 181KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ