Static task
static1
Behavioral task
behavioral1
Sample
d08fe57f980e5629561c4f54bbb12dd38630bd446f4c316338c463b161352296.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d08fe57f980e5629561c4f54bbb12dd38630bd446f4c316338c463b161352296.exe
Resource
win10v2004-20220812-en
General
-
Target
d08fe57f980e5629561c4f54bbb12dd38630bd446f4c316338c463b161352296
-
Size
305KB
-
MD5
fdf792bae89c97a246d49d7ab7f34aa7
-
SHA1
b79ad90186315338c05e4618ef8f7338179de400
-
SHA256
d08fe57f980e5629561c4f54bbb12dd38630bd446f4c316338c463b161352296
-
SHA512
e9afb3ea2afc33b4408139c40ba6997ed01c4d3a12e5547fc4f4cab2f4873c01d1190be7ed4aa241f9396c9b87486fa4beed165489a2af90c06bcefb9e7b0c5a
-
SSDEEP
6144:kUTQifoJmr+YtgWgDxcMElq4P1ntC8D5sv+Hg/yOfMyN:PTQzQ+YtgWgN5Eldns8D5sv+HyAy
Malware Config
Signatures
Files
-
d08fe57f980e5629561c4f54bbb12dd38630bd446f4c316338c463b161352296.exe windows x86
928ae13e352029e3a9c0a10663349d59
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
FindAtomA
IsBadStringPtrW
LoadLibraryW
ReleaseMutex
InitializeCriticalSection
GetFileTime
GetCurrentProcessId
GetCurrentThreadId
ReleaseMutex
GetDriveTypeA
GetEnvironmentVariableW
GetPrivateProfileStringA
CreateEventW
GlobalFlags
lstrlenW
FindClose
HeapCreate
TlsGetValue
WriteFile
user32
CallWindowProcW
DrawTextA
GetClientRect
GetKeyboardType
EndDialog
DrawStateW
SetFocus
GetSysColor
DispatchMessageA
CreateWindowExA
IsWindow
GetSysColor
GetClassInfoA
rastapi
DeviceDone
DeviceDone
DeviceDone
DeviceDone
DeviceDone
advapi32
InitializeSid
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 352KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ