Static task
static1
Behavioral task
behavioral1
Sample
00dc4b9bd023731c6c6360442abcf5bc1472ec2e9d07acd522978ef45bf11e58.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
00dc4b9bd023731c6c6360442abcf5bc1472ec2e9d07acd522978ef45bf11e58.exe
Resource
win10v2004-20220901-en
General
-
Target
00dc4b9bd023731c6c6360442abcf5bc1472ec2e9d07acd522978ef45bf11e58
-
Size
870KB
-
MD5
3469a278e6bf62ec2ae545240e49d4e1
-
SHA1
fdc9c44d60bb9c9bc3083f3268729cd6236eb739
-
SHA256
00dc4b9bd023731c6c6360442abcf5bc1472ec2e9d07acd522978ef45bf11e58
-
SHA512
ad410f5af7753d5a0a75f1b58c86c680a7af49a5c130691ad1c870aa5300b7d670c0d8ab8f10dde4922a5077f6f4e7dd7d9798b912d962b58030dd0140d32228
-
SSDEEP
12288:tOwK6xH+oxZZL/bPZQ8u7E7evCYRagFVKRgGcbnjrQxF98/sjK1ek2o5+bmUlM5:t19xHlL/c7hbRaguRFcjfy4KKIDbjlM
Malware Config
Signatures
Files
-
00dc4b9bd023731c6c6360442abcf5bc1472ec2e9d07acd522978ef45bf11e58.exe windows x86
88d1c1601c688b278ee6cfa60f02cbca
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeviceIoControl
GetStartupInfoA
TlsAlloc
Sleep
CreateFileA
DeleteFileA
GetModuleHandleA
IsBadStringPtrW
CreateFileMappingA
SuspendThread
ReleaseMutex
GetCommandLineA
HeapCreate
GetDriveTypeA
lstrlenA
GetFileAttributesA
PulseEvent
GetModuleFileNameW
IsDebuggerPresent
TlsGetValue
user32
PeekMessageA
DestroyWindow
GetWindowLongA
FindWindowW
LoadImageA
IsZoomed
DispatchMessageA
DispatchMessageA
CallWindowProcW
DrawTextW
DestroyMenu
GetIconInfo
IsWindow
cliconfg
OnInitDialogMain
OnInitDialogMain
OnInitDialogMain
OnInitDialogMain
cryptui
CryptUIDlgCertMgr
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 863KB - Virtual size: 862KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ