Static task
static1
Behavioral task
behavioral1
Sample
06dd3391e688a49bd3b41571e0dbd34b8d59ec3795a95fbd8a3f06fd306b438c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
06dd3391e688a49bd3b41571e0dbd34b8d59ec3795a95fbd8a3f06fd306b438c.exe
Resource
win10v2004-20220812-en
General
-
Target
06dd3391e688a49bd3b41571e0dbd34b8d59ec3795a95fbd8a3f06fd306b438c
-
Size
338KB
-
MD5
122a129b550a7c151884a06aba9a8030
-
SHA1
f4f04c25630107dedb2c0ade2e338bb29f593fd6
-
SHA256
06dd3391e688a49bd3b41571e0dbd34b8d59ec3795a95fbd8a3f06fd306b438c
-
SHA512
e2a7c8e8ef560aea702228288e0d852c475adbb16cae10fbbf4a050ae726033e99109d8a7eb10eaa2f761c1fda246d1667b690f3cae1840de097c045f70a4bf0
-
SSDEEP
6144:RcELjnDTyiyWhOME8bDCb4uMLcGvup7poySTtTB56Tk/:RcEbTy4hk+DCz9euYyatT+k/
Malware Config
Signatures
Files
-
06dd3391e688a49bd3b41571e0dbd34b8d59ec3795a95fbd8a3f06fd306b438c.exe windows x86
d5373fb8c4daee54d0067b48b74ddbfd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RemoveDirectoryA
SystemTimeToFileTime
SetEnvironmentVariableA
ResetEvent
CreateDirectoryW
SetHandleCount
FindClose
SetFileAttributesW
FindAtomA
CreateDirectoryExA
WriteProfileSectionA
SetEndOfFile
ReleaseSemaphore
FindNextFileA
ResumeThread
SuspendThread
OpenSemaphoreW
ReadFile
WriteFileEx
DuplicateHandle
PulseEvent
SetEvent
OpenEventA
DeleteFileW
SleepEx
OpenThread
TlsAlloc
Sleep
CompareStringA
GetTickCount
GetCurrentDirectoryA
SetCurrentDirectoryA
GetProcAddress
LoadLibraryA
GetModuleHandleA
GetStartupInfoA
user32
ToUnicode
GetWindowTextA
FindWindowA
DestroyIcon
DrawTextA
CloseDesktop
DeleteMenu
DestroyWindow
GetDC
SetWindowTextA
CloseClipboard
ShowCursor
ToAscii
CopyIcon
SetWindowLongA
CloseWindow
mfc42
ord823
msvcrt
??1type_info@@UAE@XZ
_onexit
__dllonexit
_except_handler3
__set_app_type
__p__fmode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
__p__commode
_CxxThrowException
vprintf
iswspace
toupper
__CxxFrameHandler
memcpy
_ftol
_XcptFilter
_purecall
malloc
free
_exit
_controlfp
Sections
.text Size: 292KB - Virtual size: 291KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ