Static task
static1
Behavioral task
behavioral1
Sample
1384c3c2392b3360240344e5d5de76bf74ff350a679e7a0ee94b731f1f5f04a7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1384c3c2392b3360240344e5d5de76bf74ff350a679e7a0ee94b731f1f5f04a7.exe
Resource
win10v2004-20221111-en
General
-
Target
1384c3c2392b3360240344e5d5de76bf74ff350a679e7a0ee94b731f1f5f04a7
-
Size
1.4MB
-
MD5
fa0e0890fd5427a570fd2b0fd2bfb171
-
SHA1
2a8d5a379c5aab5e6c99aa3a6d616f302adcffd0
-
SHA256
1384c3c2392b3360240344e5d5de76bf74ff350a679e7a0ee94b731f1f5f04a7
-
SHA512
ccbccb67025211fc294c76bbc07d58f246648d61750718553883b284104a612e26cb52578b9547d41c96051213a23aced1b75163221b38b99a121a1490855182
-
SSDEEP
24576:B9rzmoo352yulTyyfVoc/y5DbLAplIJkMlRdzo92S7Mi0F91X6zUE68fMRa:LqxAR2QycYDc6J/pq2SFI9afE0
Malware Config
Signatures
Files
-
1384c3c2392b3360240344e5d5de76bf74ff350a679e7a0ee94b731f1f5f04a7.exe windows x86
ab472bdb8dda700adcda2438dea10aca
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeEnvironmentStringsA
user32
LoadIconA
gdi32
GetTextMetricsA
winmm
waveOutRestart
winspool.drv
OpenPrinterA
advapi32
RegOpenKeyExA
shell32
ShellExecuteA
ole32
CLSIDFromString
oleaut32
UnRegisterTypeLi
comctl32
ord17
ws2_32
inet_ntoa
comdlg32
ChooseColorA
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
Sections
.text Size: 412KB - Virtual size: 992KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 964KB - Virtual size: 964KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ