Static task
static1
Behavioral task
behavioral1
Sample
d1cf4ab9ee294454d1802141beb74c3398e1228282bc357f91a9a4cac5a385ec.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d1cf4ab9ee294454d1802141beb74c3398e1228282bc357f91a9a4cac5a385ec.exe
Resource
win10v2004-20221111-en
General
-
Target
d1cf4ab9ee294454d1802141beb74c3398e1228282bc357f91a9a4cac5a385ec
-
Size
153KB
-
MD5
a4baa67aef63af250fcf7507b4e3632d
-
SHA1
03d29d33d1e30ca04e5db79cf47dae93621f95ab
-
SHA256
d1cf4ab9ee294454d1802141beb74c3398e1228282bc357f91a9a4cac5a385ec
-
SHA512
4903caa8113666baa7654784ec38cc9e9b1a5a6468b68aa935efb75dc447de9a73f5038187c16aaf284733a6f5ddb6f45ea4a2444112ac369cd87b90629ed1c6
-
SSDEEP
3072:MThaWkoluZkUullbm2sBC22iHbf5gpKb8+gEPnU4yAfGspGNjUvoGiZQvyPE9:MFaroluOUullbm/FRHUponU4y0v4NUo0
Malware Config
Signatures
Files
-
d1cf4ab9ee294454d1802141beb74c3398e1228282bc357f91a9a4cac5a385ec.exe windows x86
6a578a9b9dd99bb98cb8c10d1cf5388a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CallWindowProcA
GetWindowLongW
CharNextA
CloseClipboard
GetMenuState
TranslateMessage
DeleteMenu
GetParent
IsWindow
GetClientRect
LoadCursorW
SendMessageW
DrawFocusRect
SetPropA
DefWindowProcA
IntersectRect
GetCursorPos
LoadStringW
LoadImageW
ntdll
ZwStopProfile
kernel32
LoadResource
LeaveCriticalSection
FreeEnvironmentStringsA
LoadLibraryW
SetCurrentDirectoryA
UnlockFile
GetFileSize
GetCommandLineW
GetFileTime
TlsAlloc
UnhandledExceptionFilter
TerminateProcess
WaitForSingleObject
GetStartupInfoA
lstrcpyA
FindFirstFileA
InterlockedIncrement
GetCPInfo
InitializeCriticalSection
SetUnhandledExceptionFilter
SetFilePointer
GetProcAddress
FormatMessageW
CreateEventW
ReadFile
WriteConsoleA
GetModuleFileNameW
GetOEMCP
ExpandEnvironmentStringsA
GetACP
lstrcmpA
DeleteFileW
GetCurrentThreadId
FindClose
CloseHandle
FindNextFileA
SetThreadPriority
GlobalSize
InterlockedDecrement
GetStartupInfoW
GetVersionExA
VirtualProtect
CreateFileW
GetTempFileNameW
CopyFileA
DeleteFileA
GetCurrentDirectoryA
InterlockedCompareExchange
lstrcmpiA
GetDiskFreeSpaceA
LoadLibraryA
GetCurrentProcessId
CreateFileA
FreeLibrary
MapViewOfFile
InterlockedExchange
ExitProcess
GetModuleHandleA
SetEvent
GetSystemTimeAsFileTime
ole32
CoCreateInstance
CoTaskMemFree
CLSIDFromProgID
StringFromCLSID
msvcrt
_adjust_fdiv
__CxxFrameHandler
_unlock
_errno
_CxxThrowException
_controlfp
_stricmp
Sections
.text Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 30KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 46B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ