Static task
static1
Behavioral task
behavioral1
Sample
d0d62628a298ac7da35fef97e34f97e8171da14dec1852562f56ae40d9e46847.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d0d62628a298ac7da35fef97e34f97e8171da14dec1852562f56ae40d9e46847.exe
Resource
win10v2004-20220901-en
General
-
Target
d0d62628a298ac7da35fef97e34f97e8171da14dec1852562f56ae40d9e46847
-
Size
229KB
-
MD5
879ab8850653ea2bb2654d0be0c476fb
-
SHA1
acc3d16a87fcea2f4326d4c8c3424bd614833c82
-
SHA256
d0d62628a298ac7da35fef97e34f97e8171da14dec1852562f56ae40d9e46847
-
SHA512
c38c60e20e928cb808a8f24f6f83263ed3edb17be5eff283aa846655776c0289c038d77af04fcf33faf2bc313aa0b7ad143c559ca4eb85a36a3f3701c6f43d0e
-
SSDEEP
1536:IPXNwW1TtR0pc+YYcDRGEFOooJTbypkppFl:eiYJR0pcycvF43IkbF
Malware Config
Signatures
Files
-
d0d62628a298ac7da35fef97e34f97e8171da14dec1852562f56ae40d9e46847.exe windows x86
0ca068ee4534d0b56ba0a9154d58b7d1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetHandleInformation
ConnectNamedPipe
Thread32Next
GlobalFlags
IsBadWritePtr
GlobalAlloc
CreatePipe
WritePrivateProfileSectionA
GetCommMask
EnumTimeFormatsW
EnumDateFormatsA
GetPrivateProfileSectionA
IsBadStringPtrW
EnumTimeFormatsW
GlobalFindAtomA
GetProcessHeaps
SetNamedPipeHandleState
CreateHardLinkW
GlobalFlags
GetProfileIntA
GlobalAddAtomA
EnumTimeFormatsW
SetHandleInformation
SetConsoleCursor
IsBadStringPtrA
ReadConsoleOutputW
CreateHardLinkW
IsBadHugeWritePtr
FindCloseChangeNotification
GlobalAddAtomA
SetConsoleActiveScreenBuffer
GetBinaryTypeA
GetProcessAffinityMask
Process32First
CreateDirectoryExA
ClearCommBreak
SetHandleInformation
EnumTimeFormatsW
GetCommTimeouts
ExpandEnvironmentStringsA
CreateHardLinkW
FindNextFileW
ExpandEnvironmentStringsA
PeekConsoleInputA
Heap32ListFirst
Process32First
user32
SetScrollRange
FindWindowExW
GetWindowRgn
CreateDialogParamA
CreateWindowExA
SetScrollInfo
GetMenuItemCount
FindWindowExA
FindWindowExW
ShowScrollBar
ActivateKeyboardLayout
WINNLSEnableIME
FindWindowA
RemovePropW
SetWindowsHookW
UnhookWindowsHookEx
DdeCmpStringHandles
MonitorFromPoint
GetTopWindow
SetWindowTextA
CreateWindowExA
HiliteMenuItem
GetCursor
DdeCmpStringHandles
ArrangeIconicWindows
EnumDesktopWindows
SetActiveWindow
DdeConnect
TileChildWindows
Sections
.text Size: 212KB - Virtual size: 220KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tabl Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tabl Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tabl Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tabl Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.tabl Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE