Static task
static1
Behavioral task
behavioral1
Sample
4dd9bee8d6a028d09a1d30399e4e58d6f2cd46975c56ce0ef1e4dcc3c102db3a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4dd9bee8d6a028d09a1d30399e4e58d6f2cd46975c56ce0ef1e4dcc3c102db3a.exe
Resource
win10v2004-20220812-en
General
-
Target
4dd9bee8d6a028d09a1d30399e4e58d6f2cd46975c56ce0ef1e4dcc3c102db3a
-
Size
75KB
-
MD5
7d03d7bbaf95bc15537163a00507d178
-
SHA1
4ff3b81b39fec4f8369e28993c6868ad576d415b
-
SHA256
4dd9bee8d6a028d09a1d30399e4e58d6f2cd46975c56ce0ef1e4dcc3c102db3a
-
SHA512
3d3b3a3cfbd0aaafd6e5262fa5fb1e8e166768ac5c7d30cde3035f6d824e96450b9f4c2cf864cffdcf01b76d33e0f0760033fdc8d00b701e8d5df9c624259cb9
-
SSDEEP
1536:8QAvz6KkNvvmFVUdcxp7iJqHPgamCq0hR/u9VLzcQxtgtRWnA:PouNv+FVUCZiwP52+MVL6tRWnA
Malware Config
Signatures
Files
-
4dd9bee8d6a028d09a1d30399e4e58d6f2cd46975c56ce0ef1e4dcc3c102db3a.exe windows x86
c2006413a2d66df6c5668d031df051ef
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CreateDCA
SelectObject
DeleteObject
GetDeviceCaps
BitBlt
GetObjectA
GetBitmapBits
DeleteDC
CreateCompatibleDC
CreateCompatibleBitmap
kernel32
GetCurrentThreadId
GetStdHandle
FlushConsoleInputBuffer
GlobalMemoryStatus
CloseHandle
FreeLibrary
GetThreadTimes
SetLastError
GetFileType
SetErrorMode
VirtualAllocEx
user32
MessageBoxIndirectA
wsock32
socket
connect
inet_ntoa
closesocket
WSAGetLastError
WSAStartup
bind
WSACleanup
accept
gethostbyname
ntohs
WSASetLastError
send
htons
shutdown
htonl
WSACancelBlockingCall
getservbyname
listen
setsockopt
getsockopt
ntohl
recv
ole32
CoIsOle1Class
CoDisconnectObject
CoGetInstanceFromFile
CoGetClassObject
OleUninitialize
kbdfc
KbdLayerDescriptor
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 271KB - Virtual size: 274KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ