Static task
static1
Behavioral task
behavioral1
Sample
df17dd3de33d8e55b46d1e000888378e75486546c2db20bc33d9e7a8d009a387.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
df17dd3de33d8e55b46d1e000888378e75486546c2db20bc33d9e7a8d009a387.exe
Resource
win10v2004-20220812-en
General
-
Target
df17dd3de33d8e55b46d1e000888378e75486546c2db20bc33d9e7a8d009a387
-
Size
201KB
-
MD5
5ee62fff07b62bb4abdc3ef4493c49e2
-
SHA1
4f4717263e1bd4127bd54aad2612af21740ee236
-
SHA256
df17dd3de33d8e55b46d1e000888378e75486546c2db20bc33d9e7a8d009a387
-
SHA512
54543ef8821ad1620253d257e654f49257a5d2fc78b3dff9a06097cae5a8cb6767508b42071f0cead46af3781e99612ba35533909e8b0a219196798d06646268
-
SSDEEP
6144:e52Lp0Mmxjc+FnXPnPJLnyFpaSN4AmjlkYB:tLp0MmxLF/cvaM4AmjlDB
Malware Config
Signatures
Files
-
df17dd3de33d8e55b46d1e000888378e75486546c2db20bc33d9e7a8d009a387.exe windows x86
eceec8dd00b7bba6d143edd683e29c5e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memcpy
memset
kernel32
ExitProcess
HeapAlloc
GetModuleHandleW
GetProcessHeap
GetModuleFileNameW
GetProcAddress
GetModuleHandleA
lstrcatW
RtlZeroMemory
user32
CreateWindowExW
MessageBoxW
LoadStringW
RegisterClassExW
TranslateMessage
BeginPaint
PostQuitMessage
GetMessageW
DestroyWindow
EndPaint
DefWindowProcW
DispatchMessageW
ShowWindow
gdi32
AbortDoc
winspool.drv
OpenPrinterA
ClosePrinter
wintrust
WinVerifyTrust
Sections
.text Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 760B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ