Static task
static1
Behavioral task
behavioral1
Sample
dd6c1429da7de7dbdeb3aa8240010d0e062bcb555111ba1b4ff09023f1ddd8f9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dd6c1429da7de7dbdeb3aa8240010d0e062bcb555111ba1b4ff09023f1ddd8f9.exe
Resource
win10v2004-20220812-en
General
-
Target
dd6c1429da7de7dbdeb3aa8240010d0e062bcb555111ba1b4ff09023f1ddd8f9
-
Size
161KB
-
MD5
05e47b7c18d9f142b21eeb8acfdecf16
-
SHA1
ac51467ba88f2b9b3437e7764a2ddd123aa62ac1
-
SHA256
dd6c1429da7de7dbdeb3aa8240010d0e062bcb555111ba1b4ff09023f1ddd8f9
-
SHA512
120258b3787fd5eac85bb0d03a86afe9422a5d05f6ab1573025e7926ce4610431a297a7beb52713507c3a5c53c193afd145a79f5dd044f61cf39a72d449141f9
-
SSDEEP
3072:aviZHh27pgRO/bJGkxMHrZG6RplxzwG1kPZKTlZL+OMz0HXXJSE7mhXE0:Rr7RbxrIETlg30HXX5
Malware Config
Signatures
Files
-
dd6c1429da7de7dbdeb3aa8240010d0e062bcb555111ba1b4ff09023f1ddd8f9.exe windows x86
91fb8070b7884ae6289f7ec12fadfa02
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
IsWindowEnabled
LoadBitmapA
GetKeyState
GetSystemMetrics
GetCursorPos
InsertMenuItemA
GetDesktopWindow
MapWindowPoints
RedrawWindow
GetScrollInfo
SetFocus
GetSysColorBrush
UnhookWindowsHookEx
InsertMenuA
GetMenuStringA
DispatchMessageA
FillRect
UpdateWindow
FindWindowA
SetActiveWindow
CheckMenuItem
CreateMenu
SetClassLongA
DrawMenuBar
SetScrollInfo
TranslateMessage
LoadIconA
GetIconInfo
LoadCursorA
PostMessageA
GetSysColor
kernel32
IsDebuggerPresent
GetModuleHandleA
GetDriveTypeA
GetSystemTime
WaitForMultipleObjects
GetModuleHandleW
OutputDebugStringA
VirtualProtect
lstrcmpiW
GetUserDefaultLangID
LocalFileTimeToFileTime
GetStartupInfoA
GetCurrentProcess
SetUnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetACP
IsBadWritePtr
GetLocaleInfoW
GetVersion
RemoveDirectoryA
msvcrt
__getmainargs
__p__commode
_snprintf
_adjust_fdiv
signal
wcslen
fputs
_controlfp
_initterm
__setusermatherr
strchr
getenv
__set_app_type
_onexit
fclose
abort
strncpy
_XcptFilter
_setmode
_strnicmp
memset
_exit
atoi
__p__fmode
fread
atexit
__p___initenv
_except_handler3
advapi32
CryptCreateHash
RegEnumValueA
DeregisterEventSource
RevertToSelf
AdjustTokenPrivileges
RegOpenKeyExA
InitiateSystemShutdownA
GetUserNameA
OpenThreadToken
RegSetValueExA
RegOpenKeyW
RegEnumValueW
QueryServiceStatus
DeleteService
CryptReleaseContext
CheckTokenMembership
AllocateAndInitializeSid
OpenSCManagerA
SetSecurityDescriptorGroup
RegQueryInfoKeyA
ControlService
EqualSid
CryptHashData
CryptAcquireContextA
RegEnumKeyA
InitializeSecurityDescriptor
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ