Static task
static1
Behavioral task
behavioral1
Sample
1d79fbe08869552b6955e8b9a8ebbe654a5f37ed73d6fad797ecfb9923a61c64.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1d79fbe08869552b6955e8b9a8ebbe654a5f37ed73d6fad797ecfb9923a61c64.exe
Resource
win10v2004-20220901-en
General
-
Target
1d79fbe08869552b6955e8b9a8ebbe654a5f37ed73d6fad797ecfb9923a61c64
-
Size
304KB
-
MD5
21a3af79b64bbc914e9912ef9b09e040
-
SHA1
ac5393dd9247518f53d72a9cc6dd8781f886561a
-
SHA256
1d79fbe08869552b6955e8b9a8ebbe654a5f37ed73d6fad797ecfb9923a61c64
-
SHA512
3ac3810567aac73e338eaf8ac317da9524f2f05ffa04138313b7e2be6f10fc91c918606dfd03bcf4a86a1d27cc7cca03d7fb49d3a8f56631e79f8e680bfc6984
-
SSDEEP
6144:RFtiQ8l06uT4DENWu+Ga9ye6dxEs9Q29mms6wIhLHedfnt5:RPiQ8l0lNLLGmdxy29DwIhyf
Malware Config
Signatures
Files
-
1d79fbe08869552b6955e8b9a8ebbe654a5f37ed73d6fad797ecfb9923a61c64.exe windows x86
e95e04d3c058d7f17abe953551ac80fe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeW
ReleaseMutex
FindAtomW
GetSystemTime
CloseHandle
CreateFileA
LoadLibraryA
GetFileAttributesA
GetComputerNameW
ReleaseMutex
ExitProcess
lstrlenA
VirtualAlloc
GetCommandLineW
LocalFree
GetTickCount
GetModuleHandleW
ResetEvent
GetDiskFreeSpaceW
GetTickCount
user32
CloseWindow
GetMenu
DrawStateA
GetCaretPos
DestroyCaret
CallWindowProcA
CreateWindowExA
EndDialog
GetClassInfoA
DispatchMessageA
GetDlgItem
FillRect
GetClientRect
rasapi32
DwEnumEntryDetails
DwRasUninitialize
RasDeleteEntryA
DwCloneEntry
RasDialA
adsnt
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 348KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 294KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ