Static task
static1
Behavioral task
behavioral1
Sample
33feac25297593d8c5af78357243628b8cc993a0c476e26589feb99a4a38130b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
33feac25297593d8c5af78357243628b8cc993a0c476e26589feb99a4a38130b.exe
Resource
win10v2004-20221111-en
General
-
Target
33feac25297593d8c5af78357243628b8cc993a0c476e26589feb99a4a38130b
-
Size
264KB
-
MD5
0d173975e4c1493b61684cc88d6664c4
-
SHA1
70b79e22b152ff423a220be9b20e520f8c99ffc1
-
SHA256
33feac25297593d8c5af78357243628b8cc993a0c476e26589feb99a4a38130b
-
SHA512
69eb0a8d7ce33d2d3bf97d5add7199019be599450c29d752003e8b2e44454f1e4c837666fab9f51ad5200af2b87bc20a87bd65533b93fd982e66f6e45cf2ecee
-
SSDEEP
6144:+F4nSKHaYyh/T7mMTfTWcyKWjc09rQNpzJ:+F4n9yh2MTfTWcyKWjXQNX
Malware Config
Signatures
Files
-
33feac25297593d8c5af78357243628b8cc993a0c476e26589feb99a4a38130b.exe windows x86
cddec92ae15ed172995b43ff5d560365
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MapViewOfFile
GetPrivateProfileIntA
GetComputerNameA
HeapDestroy
FindAtomA
ExitProcess
VirtualAlloc
GetPriorityClass
IsDebuggerPresent
CreateFileMappingA
GetFileAttributesA
lstrlenA
LocalFree
LoadLibraryA
ResetEvent
ResumeThread
GetCommandLineA
GetModuleHandleW
GetSystemTime
CloseHandle
user32
DestroyCaret
GetDlgItem
FillRect
CloseWindow
CreateWindowExA
GetCaretPos
GetMenu
DrawStateA
EndDialog
CallWindowProcA
GetClassInfoA
GetClientRect
DispatchMessageA
rasapi32
RasDialA
DwEnumEntryDetails
DwCloneEntry
RasDeleteEntryA
DwRasUninitialize
certcli
DllGetClassObject
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 253KB - Virtual size: 253KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ