Static task
static1
Behavioral task
behavioral1
Sample
dd18cc6385d7739d096858a53fad718623f3213fc9ade194ca45d6c4652251ce.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dd18cc6385d7739d096858a53fad718623f3213fc9ade194ca45d6c4652251ce.exe
Resource
win10v2004-20220812-en
General
-
Target
dd18cc6385d7739d096858a53fad718623f3213fc9ade194ca45d6c4652251ce
-
Size
64KB
-
MD5
a37aeffffde738d037e0bdd85f768426
-
SHA1
8bc646298ebc847180cd47199c377144050be538
-
SHA256
dd18cc6385d7739d096858a53fad718623f3213fc9ade194ca45d6c4652251ce
-
SHA512
c7ca06c9f4972acfc980d3cc567641acd5cfb27ec795891bb6d3ba3f23c415c39489ce28eb1e31cc334ef6bb1bb2da1524f7d645643ccfe491ef9509ebbe781a
-
SSDEEP
768:vvZgJt+k31DLAoI9dahSaTOzyIJ+KtMLcTsqDBgA0XeeoY35JUtqjkuLq6dnnRkN:ubtmPbaCzytKtM0X0ue1eqsIk3
Malware Config
Signatures
Files
-
dd18cc6385d7739d096858a53fad718623f3213fc9ade194ca45d6c4652251ce.exe windows x86
f83612c172c7fc1d1a9fcef6ed1d68ac
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateSemaphoreW
InitializeCriticalSection
CreateFileMappingW
CreatePipe
DeviceIoControl
GetACP
GetModuleHandleA
DeleteFileA
WriteConsoleW
SetEnvironmentVariableA
CreateMailslotA
GetModuleHandleW
InterlockedExchange
VirtualAlloc
SetVolumeLabelA
GetProcessHeap
SetCurrentDirectoryA
GetShortPathNameA
GetStringTypeW
GetConsoleAliasA
DeleteFileA
DeleteFileA
FatalExit
mshtml
ShowHTMLDialog
DllEnumClassObjects
ShowModelessHTMLDialog
ShowModalDialog
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rrs Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avdr Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ