Static task
static1
Behavioral task
behavioral1
Sample
db49334f1e0280ee9ceba05bd72061705329ce64fc10c9b3f587f7e7153f8a73.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
db49334f1e0280ee9ceba05bd72061705329ce64fc10c9b3f587f7e7153f8a73.exe
Resource
win10v2004-20220901-en
General
-
Target
db49334f1e0280ee9ceba05bd72061705329ce64fc10c9b3f587f7e7153f8a73
-
Size
25KB
-
MD5
046c9903b30b11f38be2e56535f190f5
-
SHA1
b109e4d08974e999a7934d78a396aec310043678
-
SHA256
db49334f1e0280ee9ceba05bd72061705329ce64fc10c9b3f587f7e7153f8a73
-
SHA512
7a3ea00cf046e6d2132f639ce4431f4703fe11d881594d988253b6dc61793b0d3e4b93cd4cc102dfa3e9e798ffd505fe95efa3511da2f776985672cfec67c6fb
-
SSDEEP
384:NMMtyNUXRkRAiu9PbX2yl8W/8AoWlQFxH/f4kVdjaLacmkC0GJsJxXSoVcGtWoZS:HW2GAzQFxfftjaLacmkLGKZSh
Malware Config
Signatures
Files
-
db49334f1e0280ee9ceba05bd72061705329ce64fc10c9b3f587f7e7153f8a73.exe windows x86
0ac7de91a2eaf419c7fa5752b6cd5fb4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
MapViewOfFile
CreateFileMappingA
GetFileSize
UnmapViewOfFile
WinExec
GetTempFileNameA
GetTempPathA
Sleep
GetSystemDirectoryA
CreateFileA
LoadLibraryA
GetPrivateProfileStringA
ExitProcess
WritePrivateProfileStringA
OutputDebugStringA
GetModuleFileNameA
GetWindowsDirectoryA
FreeLibrary
GetLastError
DuplicateHandle
GetCurrentProcess
GetProcAddress
CloseHandle
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
msvcrt
strcpy
strcat
strrchr
strcmp
memset
atoi
strlen
strchr
_except_handler3
_stricmp
_itoa
wininet
InternetOpenA
InternetCloseHandle
InternetOpenUrlA
HttpQueryInfoA
shlwapi
PathAppendA
Sections
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 320B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ