Static task
static1
Behavioral task
behavioral1
Sample
389de577f6d1e4354e5774986e85860308cb4b079839fe6a8673f38ba8742880.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
389de577f6d1e4354e5774986e85860308cb4b079839fe6a8673f38ba8742880.exe
Resource
win10v2004-20221111-en
General
-
Target
389de577f6d1e4354e5774986e85860308cb4b079839fe6a8673f38ba8742880
-
Size
153KB
-
MD5
dfcfcc430a94c29d3eac70de3614ccbb
-
SHA1
78da713b83d60a16b5bdee287c1eca0ddf008db8
-
SHA256
389de577f6d1e4354e5774986e85860308cb4b079839fe6a8673f38ba8742880
-
SHA512
ce07c1b286f4ca98f3092674b9557a3c2a7f699d3e685f7b57d4fbe630387c16565a7af1ebdedd7348f8f4f23ab9245fcf048e1cd8331c172d9157e4a797a937
-
SSDEEP
3072:SWYU6276UjvS7RYNJ/Y2kaLo8UnMxjPHB32zCHT4hrPab:S7UdWUOlYNO2kaLoLnW9kITsrPab
Malware Config
Signatures
Files
-
389de577f6d1e4354e5774986e85860308cb4b079839fe6a8673f38ba8742880.exe windows x86
9c1d0fb955a9a4c70149aa940e342021
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoW
LocalFree
lstrcpynW
FormatMessageW
GetModuleHandleW
GlobalUnlock
GlobalLock
GlobalAlloc
lstrlenW
lstrcpyW
GlobalFree
SetLastError
WideCharToMultiByte
GetProcAddress
GetModuleHandleA
LocalAlloc
LeaveCriticalSection
GlobalReAlloc
GlobalHandle
EnterCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedDecrement
CloseHandle
lstrcmpW
ReadFile
SetFilePointer
ExitProcess
RtlUnwind
GetCommandLineA
shell32
ShellExecuteExW
shlwapi
SHDeleteKeyW
PathCombineW
ole32
CoRevokeClassObject
CoQueryProxyBlanket
CoReleaseMarshalData
OleIsCurrentClipboard
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
Sections
.text Size: 58KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 326B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ