Static task
static1
Behavioral task
behavioral1
Sample
de75711fa3579da7cd4b787833e3b383d3a14d81618777755fbdc72181bdd7bf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
de75711fa3579da7cd4b787833e3b383d3a14d81618777755fbdc72181bdd7bf.exe
Resource
win10v2004-20220812-en
General
-
Target
de75711fa3579da7cd4b787833e3b383d3a14d81618777755fbdc72181bdd7bf
-
Size
697KB
-
MD5
cb495c393eae0dc6592ccbe26d82c0c9
-
SHA1
8a295d9d9192afd5253f1e50616ede6cd298f1d9
-
SHA256
de75711fa3579da7cd4b787833e3b383d3a14d81618777755fbdc72181bdd7bf
-
SHA512
06d63bd7f0527d540cdfc096f677bcb6eeaf609b34b214491434fe48e142196251fafedaa74c7336da3f555879fae4d877a0b5398f40478cbd7ec29cc876cac0
-
SSDEEP
12288:djH/xiIXLz6T0RjzmdYfnVoM69v0KXN0aUbHc0CkufvTzmab5MSTUJ:JvXH6QRm4VgcOkbHobLijQI
Malware Config
Signatures
Files
-
de75711fa3579da7cd4b787833e3b383d3a14d81618777755fbdc72181bdd7bf.exe windows x86
77e95163837e19ece4b7aaeb2e0e803f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
GetCommandLineA
GetVersion
ExitProcess
HeapAlloc
GetProcessHeap
VirtualAlloc
FindResourceA
Sleep
VirtualFree
FindResourceW
UnmapViewOfFile
CloseHandle
ReadFile
SetFilePointer
LockResource
SizeofResource
FileTimeToLocalFileTime
GetEnvironmentStringsW
LCMapStringA
lstrlenA
HeapCreate
LeaveCriticalSection
CreateFileA
CreateEventA
FindFirstFileW
CreateFileMappingA
GetProcAddress
GetWindowsDirectoryA
GetFileSize
LoadLibraryA
FlushFileBuffers
QueryPerformanceCounter
GetLastError
LoadLibraryW
EnterCriticalSection
HeapFree
WriteConsoleW
SetEndOfFile
GlobalAlloc
TerminateProcess
SetUnhandledExceptionFilter
MultiByteToWideChar
UnhandledExceptionFilter
GetVersionExA
GetModuleFileNameW
OutputDebugStringA
InterlockedDecrement
FindClose
LoadResource
InitializeCriticalSection
LocalFree
GetOEMCP
GetStringTypeW
HeapReAlloc
GetSystemTimeAsFileTime
WriteFile
InterlockedExchange
GetStringTypeA
lstrcmpiA
SetStdHandle
FreeEnvironmentStringsW
GetConsoleMode
GetCurrentProcess
HeapDestroy
WaitForSingleObject
GetCurrentProcessId
GetModuleHandleA
GetTickCount
FreeLibrary
GetCurrentThread
advapi32
RegDeleteValueA
OpenProcessToken
RegDeleteKeyA
RegQueryValueExA
user32
SetCursor
CallWindowProcA
SendMessageA
GetSysColor
SetDlgItemTextA
EndDialog
SetWindowTextA
GetWindowRect
GetSystemMetrics
FillRect
PeekMessageA
EnableWindow
UpdateWindow
DestroyWindow
GetDC
SetWindowPos
Sections
.text Size: 657KB - Virtual size: 980KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ