Static task
static1
Behavioral task
behavioral1
Sample
408cc4c6f860a7cc85dcc236c8afb79318872f7e4c7f6b95c35cfca10531269a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
408cc4c6f860a7cc85dcc236c8afb79318872f7e4c7f6b95c35cfca10531269a.exe
Resource
win10v2004-20220812-en
General
-
Target
408cc4c6f860a7cc85dcc236c8afb79318872f7e4c7f6b95c35cfca10531269a
-
Size
482KB
-
MD5
b33cbbc309a6f641a16c3378febaa2d7
-
SHA1
e81fd1b073a4939939b4f881423a46fc6132fa7f
-
SHA256
408cc4c6f860a7cc85dcc236c8afb79318872f7e4c7f6b95c35cfca10531269a
-
SHA512
d79dbec62eec57f2ebd23166de16d2d540e4f6c5221ae59bfad190f8794b77b02b16ba2fcd49937a05aabe49393229bf6cbaa0d0963212cdde456740ef999414
-
SSDEEP
12288:JMSkfkWTsFbIFW+U6THF9+w7NnzWLC918ZQ/IaBI9V8pl:QkzVD76z1zKC9+gBBGV8p
Malware Config
Signatures
Files
-
408cc4c6f860a7cc85dcc236c8afb79318872f7e4c7f6b95c35cfca10531269a.exe windows x86
21178e3a87a7e7c438b0e928063df9fe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetClipboardSequenceNumber
GetDlgCtrlID
RegisterClassExA
SetCaretBlinkTime
CreateAcceleratorTableA
TranslateAccelerator
DdeQueryConvInfo
EnumThreadWindows
KillTimer
SetMenuDefaultItem
DlgDirListComboBoxW
VkKeyScanW
DdeFreeDataHandle
DialogBoxParamA
GetCaretBlinkTime
DestroyIcon
RegisterClassA
DefFrameProcW
EnumClipboardFormats
SetTimer
GetClassNameA
CreateDialogParamA
kernel32
LoadLibraryExW
UnhandledExceptionFilter
FreeEnvironmentStringsW
SetStdHandle
GetLastError
TlsAlloc
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
GetStringTypeA
GetTimeZoneInformation
CompareStringW
GetExitCodeProcess
QueryPerformanceCounter
ExitProcess
HeapFree
GetCurrentProcessId
GetThreadSelectorEntry
WriteFile
EnumSystemLocalesA
SetEnvironmentVariableA
LoadLibraryA
SetLastError
InitializeCriticalSection
HeapSize
GetTimeFormatA
ReadConsoleOutputCharacterA
InterlockedExchange
GetFileType
GetACP
HeapCreate
OpenMutexA
GetModuleFileNameA
TlsGetValue
HeapDestroy
GetOEMCP
IsBadWritePtr
IsValidLocale
GetStartupInfoA
DeleteCriticalSection
GetCurrentThreadId
HeapReAlloc
GetProcAddress
CompareStringA
WideCharToMultiByte
GetStringTypeW
VirtualFree
SetTimeZoneInformation
GetSystemTimeAsFileTime
GetCommandLineA
VirtualProtect
GetCPInfo
FreeEnvironmentStringsA
LCMapStringW
GetUserDefaultLCID
VirtualAlloc
GetSystemInfo
FlushFileBuffers
GetCurrentThread
lstrcpynW
WriteProfileSectionW
ReadFile
TerminateProcess
SetFilePointer
GetModuleHandleA
TlsFree
GetLocaleInfoW
GetCurrentProcess
GetVersionExA
GetStdHandle
MultiByteToWideChar
GetDateFormatA
TlsSetValue
SetHandleCount
GetEnvironmentStringsW
LCMapStringA
CloseHandle
IsValidCodePage
GetLocaleInfoA
GetLongPathNameW
GetTickCount
HeapAlloc
CreateMutexA
VirtualQuery
ContinueDebugEvent
GetEnvironmentStrings
comctl32
InitCommonControlsEx
Sections
.text Size: 148KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 310KB - Virtual size: 310KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ