Static task
static1
Behavioral task
behavioral1
Sample
cd775b3139d84a854c50b6a48a4d0b69abb6c84054eac5786033a8238dca9d5f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cd775b3139d84a854c50b6a48a4d0b69abb6c84054eac5786033a8238dca9d5f.exe
Resource
win10v2004-20221111-en
General
-
Target
cd775b3139d84a854c50b6a48a4d0b69abb6c84054eac5786033a8238dca9d5f
-
Size
374KB
-
MD5
ac8623b6b342371530df8a645d455310
-
SHA1
d67ef5f98ab358f77113f6f93fe7c23ce3ea28c4
-
SHA256
cd775b3139d84a854c50b6a48a4d0b69abb6c84054eac5786033a8238dca9d5f
-
SHA512
27aba3278f3bc27ed2156300abd44b809faf7366784cf4c2ce7730ac09340a25a61307eb9ed19c8fbd41baaa00b52d232e0996ec9dce7585a909e849ccd8062e
-
SSDEEP
6144:eUOiRMaKP9EoxGcTYNh91DQJ7w6Mcx8MYeWKnEWYzXTz+VNypJOVglH5fDsf1KpU:eNiRMkL9/u5Wcxr8/frTzcNS0G3fDsft
Malware Config
Signatures
Files
-
cd775b3139d84a854c50b6a48a4d0b69abb6c84054eac5786033a8238dca9d5f.exe windows x86
6de1be1edfa5a8524ef4de6ee47d46cb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFlags
GetNumberFormatA
ReadFile
HeapCreate
GetConsoleAliasA
GetDriveTypeW
GetPrivateProfileStringA
GetCurrentThreadId
CreateEventW
SuspendThread
lstrlenW
FindAtomA
ResumeThread
TlsGetValue
FindClose
GetCurrentProcessId
InitializeCriticalSection
LocalFree
GetEnvironmentVariableW
LoadLibraryW
user32
GetClassInfoA
EndDialog
GetKeyboardType
DispatchMessageA
DrawStateW
CreateWindowExA
IsWindow
CallWindowProcW
GetSysColor
GetSysColor
SetFocus
GetClientRect
DrawTextA
srclient
EnableSR
EnableSR
EnableSR
EnableSR
EnableSR
clbcatq
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 484KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 364KB - Virtual size: 364KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ