Static task
static1
Behavioral task
behavioral1
Sample
d2c79bf053943fd42dcff31404932d161a70050e8197a424375b0cc09e10cbc2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d2c79bf053943fd42dcff31404932d161a70050e8197a424375b0cc09e10cbc2.exe
Resource
win10v2004-20220901-en
General
-
Target
d2c79bf053943fd42dcff31404932d161a70050e8197a424375b0cc09e10cbc2
-
Size
221KB
-
MD5
1813c9526ccd127dfb8ffcfbe2f869e6
-
SHA1
42cd1cd8ff38a1a3516e45c18a094a018b7cb339
-
SHA256
d2c79bf053943fd42dcff31404932d161a70050e8197a424375b0cc09e10cbc2
-
SHA512
2b24b9bf9f71173185c1a6bd8ad8e8a158e0dc32594a8beb7822f75b65a01d2d5825f89a368fb419f3984f84abbe45219481da0b82a88bc60fb1a7eaaf89e33d
-
SSDEEP
3072:juI8zaASyeU4Comc7milOaf8jhDRIAvvj6lu9c6z5yhUfpj3XKaR03/ogq7IE2Rk:j3ASo2mwOdIQOlu9c6z5ySfh3XKaQ/w
Malware Config
Signatures
Files
-
d2c79bf053943fd42dcff31404932d161a70050e8197a424375b0cc09e10cbc2.exe windows x86
3bcdacc21da1a2ab8190603a2eaef421
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__p__fmode
_wcsicmp
_exit
__set_app_type
_cexit
_wcsnicmp
_controlfp
_adjust_fdiv
_XcptFilter
exit
_c_exit
wcscat
__p__commode
_except_handler3
wcsrchr
__wgetmainargs
fclose
_initterm
kernel32
lstrcpyW
GetCommandLineA
GetLastError
GetModuleHandleA
VirtualAlloc
FormatMessageW
ExitProcess
FileTimeToSystemTime
CloseHandle
lstrcpynW
LocalFree
GetTimeZoneInformation
GetCurrentProcess
GetTickCount
GetTempPathW
GetSystemTimeAsFileTime
VirtualFree
QueryPerformanceCounter
shell32
Shell_NotifyIconA
advapi32
RegQueryValueA
RegOpenKeyA
RegCloseKey
Sections
.text Size: 163KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ