Static task
static1
Behavioral task
behavioral1
Sample
d1c34f53a3d0866e8dcce18e9e5674b2f38795f3f7153ac45bfcde9e670397a6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d1c34f53a3d0866e8dcce18e9e5674b2f38795f3f7153ac45bfcde9e670397a6.exe
Resource
win10v2004-20220812-en
General
-
Target
d1c34f53a3d0866e8dcce18e9e5674b2f38795f3f7153ac45bfcde9e670397a6
-
Size
131KB
-
MD5
e223f4ecb2aff3a654798b478dffd9e1
-
SHA1
832d7e0cada925d19c11740503a289ef089b4633
-
SHA256
d1c34f53a3d0866e8dcce18e9e5674b2f38795f3f7153ac45bfcde9e670397a6
-
SHA512
6e3abe17596dadc47c4f2f5d8895175836fb8294aec8e9ac7f2ebf9eabace1621f327c37881a3f7fde01e7650031e98954eafcc1b5faa16e9d0e8ace2d566847
-
SSDEEP
3072:6WWYdtS0Hhg4LaC97wzsfgKKz5uPNzzpXZXziWZgpDBdL:3W0S0HhBaCWzs4KKz5cRZjVepDBJ
Malware Config
Signatures
Files
-
d1c34f53a3d0866e8dcce18e9e5674b2f38795f3f7153ac45bfcde9e670397a6.exe windows x86
00a19ce818447e25f317e767358bb8b9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
CloseHandle
VirtualFree
VirtualAlloc
lstrcpyA
SetEvent
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
FreeLibrary
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetVersionExA
CreateDirectoryA
GetDriveTypeA
LocalFree
LocalAlloc
RemoveDirectoryA
WriteFile
Sleep
ReadFile
SetFilePointer
GetLastError
CreateProcessA
MoveFileA
GetLocalTime
CreateEventA
GlobalFree
GlobalUnlock
GetTickCount
GetDiskFreeSpaceExA
GlobalMemoryStatusEx
ReleaseMutex
SetErrorMode
GetModuleHandleA
InterlockedExchange
RaiseException
GetStartupInfoA
msvcrt
_errno
strncat
_beginthreadex
calloc
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
atoi
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
strncmp
rename
strrchr
_except_handler3
free
malloc
strchr
strstr
_ftol
ceil
__getmainargs
memmove
_strnicmp
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
_CxxThrowException
msvcp60
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
msvfw32
ICSendMessage
ICSeqCompressFrameEnd
Sections
.ujyhkuy Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGE Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ