Static task
static1
Behavioral task
behavioral1
Sample
962a2de2b6f6385b4d843aeb76d5836487480c3562935d764a0cd1edbd659886.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
962a2de2b6f6385b4d843aeb76d5836487480c3562935d764a0cd1edbd659886.exe
Resource
win10v2004-20220812-en
General
-
Target
962a2de2b6f6385b4d843aeb76d5836487480c3562935d764a0cd1edbd659886
-
Size
182KB
-
MD5
130195548fc8befffe0eea15dd334de2
-
SHA1
c1bd16577a342c5d856ddf55be01da509f10b969
-
SHA256
962a2de2b6f6385b4d843aeb76d5836487480c3562935d764a0cd1edbd659886
-
SHA512
b4ab09fb56fa775ce67f1509e1636448c80b3b4999146825208db7c5cc5c550315f354e63a9feda7f6e0731bbd21e2e1b99a3c6497dcaf06e4ba68421fbe1e4b
-
SSDEEP
3072:B3c8sDl62xoBIumDkRQMLnu+xUuOoVX2l/GLmXcDwZ/jh8rYoN8oh49MFFBpWsm:wlXxoBIN8Y+Cm7LmsEZ1kHJhuM/BpW
Malware Config
Signatures
Files
-
962a2de2b6f6385b4d843aeb76d5836487480c3562935d764a0cd1edbd659886.exe windows x86
30adc300b438e6a86fa207fb3fff1850
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
SetErrorMode
HeapAlloc
WaitForSingleObject
GetProcessHeap
Sleep
lstrcatA
GetLastError
GetProcAddress
CheckRemoteDebuggerPresent
user32
MessageBoxW
ShowWindow
LoadStringW
RegisterClassExW
TranslateMessage
BeginPaint
PostQuitMessage
GetMessageW
DestroyWindow
EndPaint
UpdateWindow
DefWindowProcW
DispatchMessageW
CreateWindowExW
ntdll
DbgPrint
vsprintf
memset
memcpy
RtlUnwind
powrprof
GetActivePwrScheme
GetPwrCapabilities
IsPwrHibernateAllowed
wintrust
WintrustGetRegPolicyFlags
winspool.drv
ClosePrinter
OpenPrinterW
WritePrinter
EndDocPrinter
StartPagePrinter
EndPagePrinter
StartDocPrinterW
Sections
.text Size: 175KB - Virtual size: 175KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 496B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ