Static task
static1
Behavioral task
behavioral1
Sample
d33ee48904da0495bb076107e45db045d9e5258140b5c9077ec99dc619d7422b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d33ee48904da0495bb076107e45db045d9e5258140b5c9077ec99dc619d7422b.exe
Resource
win10v2004-20220901-en
General
-
Target
d33ee48904da0495bb076107e45db045d9e5258140b5c9077ec99dc619d7422b
-
Size
138KB
-
MD5
408c088c1d29d9084890d12723638cec
-
SHA1
c5157b1b6fc1e7932469ab0e936cc48fd1b69771
-
SHA256
d33ee48904da0495bb076107e45db045d9e5258140b5c9077ec99dc619d7422b
-
SHA512
029f8c9430f8e67a7f362b7541ce8495fe9e09107157de4c6afd54e4662935ab8f82cea50b3acbed7fbd196f804aab3a935369e0a287da21db26566a844d4c1f
-
SSDEEP
3072:F0myqqiDm7HRRbVxU0PvcoF1ZBIdzj+57fGfS5RA:3JqxDbc0tF1fIdOBUS5q
Malware Config
Signatures
Files
-
d33ee48904da0495bb076107e45db045d9e5258140b5c9077ec99dc619d7422b.exe windows x86
71f458a3392b1762de738f2a837c2b3d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
CreateFileA
GetFileAttributesA
HeapAlloc
GetProcessHeap
HeapReAlloc
HeapFree
CloseHandle
lstrlenA
GetSystemTimeAsFileTime
RtlUnwind
InterlockedExchange
VirtualQuery
GetSystemDirectoryA
SetCurrentDirectoryA
WritePrivateProfileStringA
GetFullPathNameA
user32
wvsprintfA
advapi32
CloseServiceHandle
StartServiceA
CreateServiceA
OpenSCManagerA
shell32
DragAcceptFiles
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 980B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 133KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE