Static task
static1
Behavioral task
behavioral1
Sample
444c6c336a70ea4c55ed48999651694c0f8424c3400170085ae64b129e8c247f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
444c6c336a70ea4c55ed48999651694c0f8424c3400170085ae64b129e8c247f.exe
Resource
win10v2004-20220812-en
General
-
Target
444c6c336a70ea4c55ed48999651694c0f8424c3400170085ae64b129e8c247f
-
Size
799KB
-
MD5
925bba92c34c8a17175e6a3a8bd7c5e0
-
SHA1
749512e3169ab1c11041f1916900dcb86e085824
-
SHA256
444c6c336a70ea4c55ed48999651694c0f8424c3400170085ae64b129e8c247f
-
SHA512
c4843447df57f8ff81dc653a5bce6d7305c4a0d4035a6c3c16f1dc9d0d0aa6dd239b838274c5785faf92f98195647317f10773dda692267a581e864e6686d8dc
-
SSDEEP
24576:NqBvvYFBgB9J0wlRxRaUceJayf1CR1Dbp9v2Zw+Q:N6vksztTceJlKD
Malware Config
Signatures
Files
-
444c6c336a70ea4c55ed48999651694c0f8424c3400170085ae64b129e8c247f.exe windows x86
964deaf729766ef576df5ebbfee93353
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CreateDirectoryA
ResumeThread
GetStdHandle
GetProcessHeap
GetDriveTypeA
DeleteFileA
ReadConsoleW
SuspendThread
SetLocalTime
GetFileAttributesA
CreatePipe
GetModuleHandleA
WriteFile
ResumeThread
GetCommandLineA
GlobalSize
GetLocaleInfoA
HeapSize
IsBadReadPtr
GetPriorityClass
VirtualProtect
user32
GetWindowLongA
SetCursor
SetFocus
GetMessageA
GetWindowTextW
DispatchMessageA
wsprintfA
SetRect
DestroyMenu
DrawIcon
GetWindowLongA
LoadCursorA
PeekMessageA
els
DllRegisterServer
DllRegisterServer
DllGetClassObject
DllGetClassObject
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 692KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 793KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE