Static task
static1
Behavioral task
behavioral1
Sample
d0d5567bbe8f1d08a4c1de0f2baa07a6f240c55f239938b7a12bcb37dec549b6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d0d5567bbe8f1d08a4c1de0f2baa07a6f240c55f239938b7a12bcb37dec549b6.exe
Resource
win10v2004-20221111-en
General
-
Target
d0d5567bbe8f1d08a4c1de0f2baa07a6f240c55f239938b7a12bcb37dec549b6
-
Size
62KB
-
MD5
44d62fdcf2d81aa02af712819fae944b
-
SHA1
95155605ab93175a8c495e7efbe33bb36e69955b
-
SHA256
d0d5567bbe8f1d08a4c1de0f2baa07a6f240c55f239938b7a12bcb37dec549b6
-
SHA512
de971dcab889e53975cb99513e64fd143c93c909fc1666fd23f939e5690f29b42e06669425919cc05cd47d3d573875947f944236f890632d7a94e039534a75ae
-
SSDEEP
1536:MwSmnrAbekJQ2dfh+6TE7MWC9j0617EVJAwy9Dht:MLmnMi6pJTE7Yn17E4wyjt
Malware Config
Signatures
Files
-
d0d5567bbe8f1d08a4c1de0f2baa07a6f240c55f239938b7a12bcb37dec549b6.exe windows x86
7b9de9701cff8164a1e338ee9d67b3cf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
DeleteFileW
CloseHandle
GetStartupInfoA
lstrlenA
GetVolumePathNameA
CreateEventA
CloseHandle
GetEnvironmentVariableA
GetTimeFormatA
GetCommandLineA
GetCommandLineA
TlsGetValue
FindResourceW
HeapCreate
VirtualQuery
CancelIo
ResetEvent
HeapDestroy
GetModuleHandleA
user32
CallWindowProcA
GetSysColor
IsZoomed
GetWindowLongA
IsWindow
CreateIcon
FindWindowA
GetClassInfoA
DestroyMenu
PeekMessageA
DispatchMessageA
DispatchMessageA
DrawTextW
psbase
SPDeleteSubtype
SPDeleteSubtype
SPDeleteSubtype
SPDeleteSubtype
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 54KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE