Static task
static1
Behavioral task
behavioral1
Sample
dcd445646671cbd94d3960b9a706c3b27e9f4f3774e754878f60e34aac92ceb6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dcd445646671cbd94d3960b9a706c3b27e9f4f3774e754878f60e34aac92ceb6.exe
Resource
win10v2004-20220812-en
General
-
Target
dcd445646671cbd94d3960b9a706c3b27e9f4f3774e754878f60e34aac92ceb6
-
Size
279KB
-
MD5
0895d4477278b9b0ab646d20454d51c2
-
SHA1
681d768d11c94815236d6a8ba37000355ecddba5
-
SHA256
dcd445646671cbd94d3960b9a706c3b27e9f4f3774e754878f60e34aac92ceb6
-
SHA512
d4e6a74466b1b5c62272143d0ed0c725688d2c5a1df9894b6c3cdeb117c6bf31e4705998453c270d50293e5638008218bd95081af52db3268f85685c9e89ea65
-
SSDEEP
6144:K2fbZM6AaRiIDoG7eFkutafZ6nKUyBjaLBGoaECtkmqQK:d808G7ski8Z6nKU02KEekhr
Malware Config
Signatures
Files
-
dcd445646671cbd94d3960b9a706c3b27e9f4f3774e754878f60e34aac92ceb6.exe windows x86
74cdc975eca005d3bd1b0f500f3d9c43
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CopyFileW
CreateDirectoryA
CreateDirectoryW
CreateEventA
CreateEventW
CreateFileA
CreateFileW
CreateMutexA
CreateMutexW
CreateProcessA
CreateProcessW
CreateThread
DeleteCriticalSection
DeleteFileA
DeleteFileW
DeviceIoControl
EnterCriticalSection
ExpandEnvironmentStringsA
ExpandEnvironmentStringsW
FileTimeToSystemTime
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
FreeLibrary
GetCurrentDirectoryA
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDriveTypeA
GetDriveTypeW
GetExitCodeProcess
GetExitCodeThread
GetFileAttributesA
GetFileAttributesW
GetFileTime
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetPrivateProfileStringA
GetProcAddress
GetProcessHeap
GetProfileStringA
GetProfileStringW
CopyFileA
GetSystemDefaultLangID
GetSystemDirectoryA
GetSystemDirectoryW
GetSystemTimeAsFileTime
GetTickCount
GetUserDefaultLangID
GetVersion
GetVersionExA
GetWindowsDirectoryA
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
MapViewOfFile
MultiByteToWideChar
OpenEventA
OpenEventW
QueryDosDeviceA
QueryDosDeviceW
QueryPerformanceCounter
ReadFile
ReleaseMutex
RemoveDirectoryA
RemoveDirectoryW
ResetEvent
SetCurrentDirectoryA
SetCurrentDirectoryW
SetEndOfFile
SetErrorMode
SetEvent
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
UnhandledExceptionFilter
UnmapViewOfFile
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteFile
WriteProfileStringA
WriteProfileStringW
lstrcpynW
lstrlenA
lstrlenW
CompareStringA
CloseHandle
GetCommandLineW
GetStartupInfoA
VirtualAlloc
user32
LoadCursorA
LoadIconA
gdi32
GetStockObject
advapi32
RegOpenKeyExW
RegCloseKey
Sections
.text Size: 271KB - Virtual size: 270KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 552B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ