Static task
static1
Behavioral task
behavioral1
Sample
7073f4286a30a37b6a0faea483b79c6caa6b23133421757c515ec7388d3d19ee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7073f4286a30a37b6a0faea483b79c6caa6b23133421757c515ec7388d3d19ee.exe
Resource
win10v2004-20220901-en
General
-
Target
7073f4286a30a37b6a0faea483b79c6caa6b23133421757c515ec7388d3d19ee
-
Size
1.8MB
-
MD5
3d7684528be046a32765faf98f9ad34a
-
SHA1
ccad496d04468852d6bd8a63d7addddfb79ff6fb
-
SHA256
7073f4286a30a37b6a0faea483b79c6caa6b23133421757c515ec7388d3d19ee
-
SHA512
e6dd81e302a3a5e75c48a9132f1c060c474bd8af52012db17b86ab949bbc2ebdf5032980f98efe56d2a52da8d63ff5fabfff2446712d6bf31c10587f600445f1
-
SSDEEP
49152:yko42EJ0BHqVq+iiTCnTxQCVtPrFbdlzrk4488H:ho5ES+iiTCTxpVtPrFJp7488H
Malware Config
Signatures
Files
-
7073f4286a30a37b6a0faea483b79c6caa6b23133421757c515ec7388d3d19ee.exe windows x86
68553be97c5a70ea05181c398968c335
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
waveOutUnprepareHeader
ws2_32
getpeername
rasapi32
RasHangUpA
kernel32
SetLastError
user32
UnregisterClassA
gdi32
RectVisible
winspool.drv
OpenPrinterA
advapi32
RegCloseKey
shell32
ShellExecuteA
ole32
CLSIDFromString
oleaut32
LoadTypeLi
comctl32
ord17
wininet
InternetCanonicalizeUrlA
comdlg32
GetOpenFileNameA
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
Sections
.text Size: 780KB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 1000KB - Virtual size: 1000KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ