Static task
static1
Behavioral task
behavioral1
Sample
d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exe
Resource
win10v2004-20220812-en
General
-
Target
d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a
-
Size
306KB
-
MD5
f3ebfa7620168235291806a159b573ff
-
SHA1
3dcd61c8efe9a1e4b9eba69da5e288c3103cfb51
-
SHA256
d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a
-
SHA512
8f191287944d1afd1148a9039068601a5111b4182ef1379b83139c7617a19a3943b7c924d0a5db63d5caab72c2e0cda8f396c7f686dc83ddd86c128bb2e7dcef
-
SSDEEP
6144:esAAud4378+l4A4qxy/3wyhu1r4/G3MbCr5X79e/cPszxSg:esAIr7SA48UnFOcS5Xac
Malware Config
Signatures
Files
-
d348da2e46c8cc8b6306538a30c592ae3fd42bbf45193ce2fd9ab5c6f332fc4a.exe windows x86
c4a05ac56e81fb312d3dd7fa1227ed1f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
LoadLibraryA
CreateFileMappingW
GetACP
GetConsoleAliasA
CreateSemaphoreW
GetShortPathNameW
GetModuleHandleW
GetConsoleTitleA
DeleteFileA
SetVolumeLabelW
WriteConsoleW
DeleteFileA
GetStringTypeW
SetCurrentDirectoryA
DeleteFileA
DeviceIoControl
GetStringTypeW
FatalExit
InitializeCriticalSection
SetEnvironmentVariableA
VirtualAlloc
CreateMailslotA
mshtml
ShowHTMLDialog
DllEnumClassObjects
MatchExactGetIDsOfNames
ShowModelessHTMLDialog
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.orpc Size: 298KB - Virtual size: 298KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avr Size: 1024B - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE