Static task
static1
Behavioral task
behavioral1
Sample
d637df71be6969d09838ce0869fb793f77a8cc403246ce98530719fb4e262a29.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d637df71be6969d09838ce0869fb793f77a8cc403246ce98530719fb4e262a29.exe
Resource
win10v2004-20220812-en
General
-
Target
d637df71be6969d09838ce0869fb793f77a8cc403246ce98530719fb4e262a29
-
Size
294KB
-
MD5
01fde87377332ddec34d0059f168d913
-
SHA1
62c5eeb5e4192b3a58b5da26124deca2b1f80fa3
-
SHA256
d637df71be6969d09838ce0869fb793f77a8cc403246ce98530719fb4e262a29
-
SHA512
805bfc3fa01cbd1199a9e997700ed29e9ffc3f4ff178973572fc3f309f961f7ea6e0dd35e06e4f314306f0b74f5a0a624971a6fb4ac3b804621f7095d633e96b
-
SSDEEP
6144:ZIZSO5d40ucOxQSSO35uP1Pz38FoOydJQGguaFkSuZ/cBy2zsbB6LOe:qzkp35ebiC1gu2gc9z6B6Ll
Malware Config
Signatures
Files
-
d637df71be6969d09838ce0869fb793f77a8cc403246ce98530719fb4e262a29.exe windows x86
7fdfc9255ec2e4078c32e92b4b5d67a0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapDestroy
ExitProcess
WriteConsoleA
GetEnvironmentVariableW
GetFileAttributesA
GetTickCount
HeapCreate
GetCommandLineW
SuspendThread
GetStartupInfoA
CloseHandle
GetModuleHandleA
OpenThread
DeleteFileA
FindVolumeClose
ReleaseMutex
CloseHandle
FindResourceExW
OpenEventW
SetEvent
user32
DispatchMessageA
GetIconInfo
SetFocus
CallWindowProcW
PeekMessageA
IsZoomed
GetKeyState
GetWindowLongA
DispatchMessageA
GetCaretPos
FindWindowA
GetSysColor
GetClassInfoA
htui
HTUI_ColorAdjustment
HTUI_ColorAdjustment
HTUI_ColorAdjustment
HTUI_ColorAdjustment
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 608KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 442KB - Virtual size: 441KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ