Static task
static1
Behavioral task
behavioral1
Sample
db1fe4f736f39b055b54f1210b6effc6cd685eff79724f4976f19956565fba18.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
db1fe4f736f39b055b54f1210b6effc6cd685eff79724f4976f19956565fba18.exe
Resource
win10v2004-20220812-en
General
-
Target
db1fe4f736f39b055b54f1210b6effc6cd685eff79724f4976f19956565fba18
-
Size
65KB
-
MD5
6b578bd30154be321dc7ae476f5b8fd2
-
SHA1
a89c97d2bad69fc1a87ed4bea113b8598586b798
-
SHA256
db1fe4f736f39b055b54f1210b6effc6cd685eff79724f4976f19956565fba18
-
SHA512
7dbc8920a594fc6738196efb700c1794b3c0f08dd740bd681c6f505eaa20f28ee3caaf9b8486280f83e0aa5793a268d97f80bbfa39827a576f3c31f917b10368
-
SSDEEP
1536:ZEjn8dCIJYwOfqq1kzl2JOhwi3juwH5lhwlNW:ZEz8Ek6NaXywV+N
Malware Config
Signatures
Files
-
db1fe4f736f39b055b54f1210b6effc6cd685eff79724f4976f19956565fba18.exe windows x86
1b1c79bb08d7891015e99edc73083fba
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
ntdll
memset
memcpy
powrprof
IsPwrHibernateAllowed
kernel32
GetProcAddress
GetCurrentProcess
CloseHandle
user32
PostQuitMessage
TranslateMessage
TranslateAcceleratorW
DispatchMessageW
LoadAcceleratorsW
GetMessageW
DefWindowProcW
advapi32
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
Sections
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ