Static task
static1
Behavioral task
behavioral1
Sample
dd24077ba836da8dbf945c27af7a9684564fc3b9017b98afc8d6ea711d6d68bf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dd24077ba836da8dbf945c27af7a9684564fc3b9017b98afc8d6ea711d6d68bf.exe
Resource
win10v2004-20220812-en
General
-
Target
dd24077ba836da8dbf945c27af7a9684564fc3b9017b98afc8d6ea711d6d68bf
-
Size
711KB
-
MD5
d6bd69d95e552f4f6ec33f404921442a
-
SHA1
32bf511bbadf07651ddb9aa4a925e6e0719b67ed
-
SHA256
dd24077ba836da8dbf945c27af7a9684564fc3b9017b98afc8d6ea711d6d68bf
-
SHA512
7e0459f4c1a3c5d8faa9b3b0801625fd69989da980b920e1947675d01e243eaba09401f6858520add06b0911cad2cb7a2abd493762f078f29dd7d404253a2681
-
SSDEEP
12288:uiae2MZ/chJChsg82iBlWcAet6/JtclnzFSVhU45hgm9jHys3:uiag/9sg82inWcAet6/JtclnzFSVhU+T
Malware Config
Signatures
Files
-
dd24077ba836da8dbf945c27af7a9684564fc3b9017b98afc8d6ea711d6d68bf.exe windows x86
d883d0cd5b1286b38d6cafa42796d096
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
iphlpapi
GetAdaptersInfo
kernel32
AddAtomA
CloseHandle
CopyFileW
CreateDirectoryW
CreateMutexA
CreateSemaphoreA
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsA
ExpandEnvironmentStringsW
FindAtomA
FindResourceA
FormatMessageA
GetAtomNameA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetProcAddress
GetSystemDirectoryW
GetTickCount
GetVersionExA
GetVolumeInformationA
GetVolumeInformationW
GetWindowsDirectoryA
GetWindowsDirectoryW
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
LoadResource
LockResource
MoveFileExW
MultiByteToWideChar
ReleaseMutex
ReleaseSemaphore
SetLastError
SetUnhandledExceptionFilter
SizeofResource
Sleep
SleepEx
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VerSetConditionMask
VerifyVersionInfoA
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
lstrcpyA
msvcrt
_fdopen
_read
_strcmpi
_strdup
_write
__getmainargs
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_errno
_filelengthi64
_fstati64
_gmtime64
_iob
_isctype
_lseeki64
_onexit
_pctype
_setmode
_snprintf
_stat64
_sys_nerr
_time64
_vsnprintf
_vsnwprintf
_wfopen
abort
atexit
atoi
calloc
exit
fclose
fflush
fgetc
fgetpos
fgets
fopen
fputc
fputs
fread
free
fseek
fsetpos
fwrite
getc
getenv
getwc
iswctype
localeconv
malloc
mbstowcs
memchr
memcmp
memcpy
memmove
memset
putc
putwc
realloc
setlocale
setvbuf
signal
sprintf
sscanf
strchr
strcmp
strcoll
strcpy
strerror
strftime
strlen
strncmp
strncpy
strrchr
strstr
strtod
strtol
strtoul
strxfrm
swprintf
time
tolower
toupper
towlower
towupper
ungetc
ungetwc
vfprintf
wcscmp
wcscoll
wcsftime
wcslen
wcstok
wcstombs
wcsxfrm
shell32
ShellExecuteExA
ShellExecuteW
ws2_32
WSACleanup
WSAGetLastError
WSAIoctl
WSASetLastError
WSAStartup
__WSAFDIsSet
bind
closesocket
connect
gethostbyname
getpeername
getsockname
getsockopt
htons
ioctlsocket
ntohs
recv
select
send
setsockopt
socket
Sections
.text Size: 584KB - Virtual size: 583KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 728B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 30KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE