Static task
static1
Behavioral task
behavioral1
Sample
dc0772e5c2716157f40644f9a47199a349725f190e9408123290cac19da795da.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
dc0772e5c2716157f40644f9a47199a349725f190e9408123290cac19da795da.exe
Resource
win10v2004-20220901-en
General
-
Target
dc0772e5c2716157f40644f9a47199a349725f190e9408123290cac19da795da
-
Size
747KB
-
MD5
0ebf6d7bc4449ec1fe75244aafb09e4a
-
SHA1
1e84d2c49703ef54284321af90ab8904e3e2062f
-
SHA256
dc0772e5c2716157f40644f9a47199a349725f190e9408123290cac19da795da
-
SHA512
1587f283bcbc170d3a495d169408a76bf6b8dc4613b19402bf4cc4a3d1163fdb57616336ce3344c4f243f50e7a8d94e928c7ed31da27d35482269564af53816d
-
SSDEEP
12288:v702NE078i9pjpgJ3RqAz/g5mf1ufgwGeH9tkkAugCH6ye/hnW2XF:T3EkpAvz/mmkhhfAut6rxW2V
Malware Config
Signatures
Files
-
dc0772e5c2716157f40644f9a47199a349725f190e9408123290cac19da795da.exe windows x86
1bf926b5fa0e297a538d5339dd51ada3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
CreateFileA
GetEnvironmentVariableW
GetCommandLineW
SetLastError
CloseHandle
VirtualAllocEx
ResetEvent
GetStartupInfoW
GetStdHandle
CreateMutexA
FindClose
WaitForSingleObject
RemoveDirectoryA
GetTickCount
DeleteFileA
HeapSize
OpenProcess
GetModuleHandleA
SetEvent
GetFileAttributesA
user32
FindWindowW
DispatchMessageW
GetSysColor
MessageBoxA
DispatchMessageW
PeekMessageA
GetDC
GetClassInfoA
CallWindowProcW
GetWindowLongA
GetDC
FillRect
GetDC
perfctrs
CloseNbfPerformanceData
CloseNbfPerformanceData
CloseNbfPerformanceData
CloseNbfPerformanceData
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 741KB - Virtual size: 740KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ