Static task
static1
Behavioral task
behavioral1
Sample
ded7a06f0e93531d65347ca5f707ceb2f7123428e0db78f74497c19f419b8810.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ded7a06f0e93531d65347ca5f707ceb2f7123428e0db78f74497c19f419b8810.exe
Resource
win10v2004-20220812-en
General
-
Target
ded7a06f0e93531d65347ca5f707ceb2f7123428e0db78f74497c19f419b8810
-
Size
185KB
-
MD5
836b3c81bb7e9ff5cf18cd9be4fea770
-
SHA1
26253b7029c56e0cb579b09d5de5fdb56711ae14
-
SHA256
ded7a06f0e93531d65347ca5f707ceb2f7123428e0db78f74497c19f419b8810
-
SHA512
fcc89fd9277b5f0ba25608b823f5054c7fba3587767b732ccbe6d7847a095576d75bfcb607f83e996796c3d1df0ed6f5136dfa791def9efb76bb1b903f3422ab
-
SSDEEP
3072:vhm1w+6wcou7M7jVEIxa8VgcKlbV63hpkGDQfF5cc4LT0LFoehKroljQ:vhT+6KRjVtxtKLG07MX+o9c
Malware Config
Signatures
Files
-
ded7a06f0e93531d65347ca5f707ceb2f7123428e0db78f74497c19f419b8810.exe windows x86
0117f745b4a545fa38f0a73dfc2698d2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SheSetCurDrive
SHOpenFolderAndSelectItems
SHCreateProcessAsUserW
kernel32
ExitProcess
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
GetCommandLineA
GetCurrentProcess
GetEnvironmentStringsW
GetLastError
GetModuleHandleA
GetProcAddress
GetStringTypeA
GetStringTypeW
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
LoadLibraryA
MultiByteToWideChar
RtlUnwind
Sleep
TerminateProcess
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WaitForMultipleObjectsEx
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcpyA
gdi32
RectVisible
CombineTransform
Arc
Sections
.text Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ