Static task
static1
Behavioral task
behavioral1
Sample
0690fc44fe58c4e261301b09b43da8cf057555553ac935e63b0842473e9b18d9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0690fc44fe58c4e261301b09b43da8cf057555553ac935e63b0842473e9b18d9.exe
Resource
win10v2004-20220812-en
General
-
Target
0690fc44fe58c4e261301b09b43da8cf057555553ac935e63b0842473e9b18d9
-
Size
400KB
-
MD5
2b7fc446bd3b5dc37c2fb9b95782037e
-
SHA1
4100cb2b923c51e609069629b928214738b083c5
-
SHA256
0690fc44fe58c4e261301b09b43da8cf057555553ac935e63b0842473e9b18d9
-
SHA512
0ad81dc17a2628da6fb1879c0ca9b9765565c44c75660bafd7f8733fcc95bd1891934bb8eb7a628aab07c8e8a884f13f3250c49b4e572cc6ac1b7d561b6a4a9f
-
SSDEEP
12288:bxufXF/0WjdBpgTUek9eK6G9+5RYJ5b4Kb8:wf1/0WZBpgTUhe/T5Ri4u8
Malware Config
Signatures
Files
-
0690fc44fe58c4e261301b09b43da8cf057555553ac935e63b0842473e9b18d9.exe windows x86
d2929550bfa7994069fa2bce38cfb287
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
StartPage
GetEnhMetaFilePaletteEntries
SetWindowExtEx
TextOutA
EngQueryLocalTime
GdiAddGlsRecord
OffsetClipRgn
kernel32
GetDriveTypeW
OpenWaitableTimerA
GetWriteWatch
IsDebuggerPresent
VirtualProtect
GetStartupInfoA
GetProcessVersion
GetCommandLineW
lstrcmpW
SetMailslotInfo
IsDebuggerPresent
ReleaseMutex
GetConsoleAliasExesW
ole32
GetClassFile
StgIsStorageILockBytes
OleUninitialize
CoUnmarshalHresult
Sections
.text Size: 394KB - Virtual size: 394KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 575KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 888B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ