Static task
static1
Behavioral task
behavioral1
Sample
ddf5bbae3b54421680282d90d8a93930a8c298e5ce6a7a56702e4c2aae690cf0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ddf5bbae3b54421680282d90d8a93930a8c298e5ce6a7a56702e4c2aae690cf0.exe
Resource
win10v2004-20221111-en
General
-
Target
ddf5bbae3b54421680282d90d8a93930a8c298e5ce6a7a56702e4c2aae690cf0
-
Size
767KB
-
MD5
75f21dda23c48e91d36ee0314f72a79d
-
SHA1
c248ae1fc071c59559e952de6b6b0dba247b7c93
-
SHA256
ddf5bbae3b54421680282d90d8a93930a8c298e5ce6a7a56702e4c2aae690cf0
-
SHA512
eef821136ac7f1b4a65ed39c2ac3e23149b253b065795171c9e3e19fa874de28b8f0a4a8314e86484602d7be94d20412d69fb324f03a12b0d522a90e140772a2
-
SSDEEP
12288:/FiaWX2g4nyQ07YuXODiZaKCrMMyj/UunnWC+P34Ert2Saf:/FiLX2g4nt079GieMMyjMunWFPHtJ6
Malware Config
Signatures
Files
-
ddf5bbae3b54421680282d90d8a93930a8c298e5ce6a7a56702e4c2aae690cf0.exe windows x86
853c3753fad7d1d78952cfdf8d093a57
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapSize
CreateFileMappingW
OpenEventW
ReleaseSemaphore
GetCommandLineW
GetStdHandle
CreateFileA
VirtualProtectEx
WriteConsoleW
HeapDestroy
DeleteFileA
CloseHandle
GetFileSize
Sleep
RemoveDirectoryW
CreateMutexA
lstrlenA
RemoveDirectoryW
WriteFile
CloseHandle
ReleaseMutex
LoadLibraryA
GetVersion
CreatePipe
CreateDirectoryW
user32
DestroyMenu
DrawTextW
IsZoomed
GetClassInfoA
MessageBoxA
DispatchMessageA
PeekMessageA
FindWindowA
GetSysColor
GetWindowLongA
CreateIcon
DestroyMenu
IsWindow
eventcls
DllGetClassObject
DllGetClassObject
DllGetClassObject
DllGetClassObject
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 760KB - Virtual size: 760KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE