Static task
static1
Behavioral task
behavioral1
Sample
77e545c4bbf09e2debab46b825974c37aba9e998915d51a0c57cdd8fc94decd6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
77e545c4bbf09e2debab46b825974c37aba9e998915d51a0c57cdd8fc94decd6.exe
Resource
win10v2004-20220812-en
General
-
Target
77e545c4bbf09e2debab46b825974c37aba9e998915d51a0c57cdd8fc94decd6
-
Size
142KB
-
MD5
d94559c98aa04af4a2aab2f680c9cf0c
-
SHA1
0a4b591b1c9398b8b73e111556a646683cf30c4b
-
SHA256
77e545c4bbf09e2debab46b825974c37aba9e998915d51a0c57cdd8fc94decd6
-
SHA512
cdfd32e92bd8ab66c77c7c13ddb61e70a36c0618f29e3c27818c0a5ccb38908e89621970948c2cee8b1d71fdd81cc4acf63bd8448f6c3c9c179df6d9dad52d4c
-
SSDEEP
3072:YfcWHESfTLcMR/sS3GePdNdj9FRMHzzecy8C0eQ:ufPcpCG0fJMHneMCE
Malware Config
Signatures
Files
-
77e545c4bbf09e2debab46b825974c37aba9e998915d51a0c57cdd8fc94decd6.exe windows x86
d8ae183ea2e013ac03cca6230f154e08
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeW
GetACP
VirtualAlloc
GetExitCodeProcess
lstrlenA
LocalSize
ResumeThread
GetPrivateProfileIntW
GlobalFree
FindVolumeClose
CloseHandle
GetEnvironmentVariableA
LocalFree
GetModuleHandleW
WriteFile
FreeConsole
InterlockedExchange
ResetEvent
GetMailslotInfo
CreateThread
user32
DrawStateW
GetCursorInfo
CreateWindowExA
IsWindow
CallWindowProcW
GetKeyboardType
SetFocus
GetSysColor
GetClassInfoA
GetSysColor
DispatchMessageA
GetClientRect
EndDialog
qedit
DllUnregisterServer
DllUnregisterServer
DllGetClassObject
DllUnregisterServer
DllUnregisterServer
sysdm.cpl
NoExecuteAddFileOptOutList
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 412KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 375KB - Virtual size: 375KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ