Static task
static1
Behavioral task
behavioral1
Sample
d6bc7c14d40f3ed6b00ab57d67fe241a521cf8bd38b0e225a25250bf427050a4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d6bc7c14d40f3ed6b00ab57d67fe241a521cf8bd38b0e225a25250bf427050a4.exe
Resource
win10v2004-20221111-en
General
-
Target
d6bc7c14d40f3ed6b00ab57d67fe241a521cf8bd38b0e225a25250bf427050a4
-
Size
14KB
-
MD5
0a82af21adc35e36e0782275fdc09c58
-
SHA1
214f2f36d0677cf5a7f45974bc1d0b547b4ac8f2
-
SHA256
d6bc7c14d40f3ed6b00ab57d67fe241a521cf8bd38b0e225a25250bf427050a4
-
SHA512
c91c0c56fd5ced63ffe197dbd0559f39b3dbcb7a96a916ea2dadf16e08f50f37ad9b7dd6363b5c8f732e44f706915dda4793512b8643f8e344e0f22bbc66b022
-
SSDEEP
192:hiulnTYOauSH+3oxm0LV7+oOGf4KH6M7qNvmHoO/Ca+LC0bu:RlMHvm0LVyiKmpLKbu
Malware Config
Signatures
Files
-
d6bc7c14d40f3ed6b00ab57d67fe241a521cf8bd38b0e225a25250bf427050a4.exe windows x86
266d1c18ac8a3f2a6624b0cf47d33522
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumCalendarInfoA
TlsGetValue
GetModuleHandleA
EnterCriticalSection
lstrlenW
GetCurrentProcessId
GetNumberFormatA
FindAtomA
CreateEventW
GetCurrentThreadId
GetPrivateProfileStringA
SetLastError
LocalFree
ResumeThread
GetConsoleAliasA
LocalFlags
GetDriveTypeW
FindClose
ReadFile
HeapCreate
user32
GetMenuInfo
DrawTextA
GetSysColor
SetFocus
CallWindowProcW
IsWindow
GetKeyState
GetClassInfoA
GetClientRect
GetCursorInfo
DispatchMessageA
DispatchMessageA
GetKeyboardType
stclient
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
ntshrui
IsPathSharedA
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 492KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 359KB - Virtual size: 358KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ