Static task
static1
Behavioral task
behavioral1
Sample
db633ae34c68eab624dc5eb0fd2495c532327bf699412f7c76ce981f274bcb7a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
db633ae34c68eab624dc5eb0fd2495c532327bf699412f7c76ce981f274bcb7a.exe
Resource
win10v2004-20220812-en
General
-
Target
db633ae34c68eab624dc5eb0fd2495c532327bf699412f7c76ce981f274bcb7a
-
Size
165KB
-
MD5
43cb1e2a7dffbf158cfbe5e535ee0d80
-
SHA1
165b9d4b06a106932933689ed29def9a0c8abb2a
-
SHA256
db633ae34c68eab624dc5eb0fd2495c532327bf699412f7c76ce981f274bcb7a
-
SHA512
ae8f0ff0398612ad5919b815b3391f3f4f04ca9b0117e3f7e1e1f977dbe40b8accbcc58b6bcd3baed78bcb84dfe29d1c62945258fceffad9dbfae0f72e06da9d
-
SSDEEP
3072:MYfJY9GYkX4d/1P2RDERsoz/NVyvB9yt58DaOf1ZcJipeAJ4rEPgQyTTo:PZI91SYxsvmt56aOf1l8AJ4rEPE
Malware Config
Signatures
Files
-
db633ae34c68eab624dc5eb0fd2495c532327bf699412f7c76ce981f274bcb7a.exe windows x86
2c0502e184a0c348a5554cdea7331fc1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeResource
GetACP
GetCommandLineA
GetCurrentDirectoryA
GetCurrentProcess
GetDiskFreeSpaceA
GetDriveTypeA
GetExitCodeProcess
GetFileTime
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetNamedPipeInfo
GetPrivateProfileIntA
GetPrivateProfileStringA
GetProcAddress
GetProcessShutdownParameters
GetShortPathNameA
GetStartupInfoA
GetSystemDirectoryA
GetSystemInfo
GetTempFileNameA
GetTempPathA
GetVersion
GetVolumeInformationA
GetWindowsDirectoryA
GlobalAlloc
GlobalLock
GlobalUnlock
Heap32ListFirst
IsProcessorFeaturePresent
LoadLibraryA
LoadLibraryExA
LoadResource
FreeLibrary
LocalFileTimeToFileTime
LocalFree
LocalHandle
LockResource
MulDiv
ReadConsoleOutputAttribute
RemoveDirectoryA
ResetEvent
RtlUnwind
SetCurrentDirectoryA
SetEvent
SetFileApisToANSI
SetFilePointer
SetFileTime
SetProcessPriorityBoost
SetThreadPriority
SizeofResource
TerminateJobObject
TerminateThread
Toolhelp32ReadProcessMemory
VirtualAlloc
VirtualFree
VirtualProtectEx
WaitForSingleObject
WriteFile
WritePrivateProfileStringA
_lclose
_lopen
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
FormatMessageA
FindResourceA
FindNextFileA
FindFirstFileA
FindClose
ExitProcess
DeleteTimerQueueEx
DeleteFileA
CreateThread
CreateProcessA
CreateEventA
CreateDirectoryA
LocalAlloc
AllocConsole
user32
GetWindowRect
LoadStringA
MessageBeep
MessageBoxA
MsgWaitForMultipleObjects
PeekMessageA
ReleaseDC
SendDlgItemMessageA
SendMessageA
SetDlgItemTextA
SetForegroundWindow
SetWindowPos
SetWindowTextA
ShowWindow
wsprintfA
GetDlgItemTextA
GetDlgItem
GetDesktopWindow
GetDC
ExitWindowsEx
EndDialog
EnableWindow
DispatchMessageA
DialogBoxIndirectParamA
CharUpperA
CharPrevA
CharNextA
CallWindowProcA
GetWindowLongA
gdi32
GetDeviceCaps
advapi32
RegQueryValueExA
AdjustTokenPrivileges
AllocateAndInitializeSid
EqualSid
OpenProcessToken
RegCloseKey
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyExA
RegQueryInfoKeyA
RegSetValueExA
Sections
.text Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ