Static task
static1
Behavioral task
behavioral1
Sample
ddebe0aedc41463f8aedb4d520dd94e01146066d8a7d45bf7b513e4c2098e1d8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ddebe0aedc41463f8aedb4d520dd94e01146066d8a7d45bf7b513e4c2098e1d8.exe
Resource
win10v2004-20220901-en
General
-
Target
ddebe0aedc41463f8aedb4d520dd94e01146066d8a7d45bf7b513e4c2098e1d8
-
Size
72KB
-
MD5
7f5d1e9a8dc0304cbbbed0bc041c416e
-
SHA1
38c2d384435cf235c545439eb66e3d77a3029491
-
SHA256
ddebe0aedc41463f8aedb4d520dd94e01146066d8a7d45bf7b513e4c2098e1d8
-
SHA512
65542c310ac02b0fd74ee6ff878bd8c4c8c41de752cd90b61ee5aa61546d1c4f7b0bfceb4d44c2985ed92e76d47ef5d5362bafdc1a7b81254ea5d7a558461c45
-
SSDEEP
1536:iE5RdGUPMWLpbQ/UTO77gInaG/l8sdGZJ6:SUrccL8//Jgn
Malware Config
Signatures
Files
-
ddebe0aedc41463f8aedb4d520dd94e01146066d8a7d45bf7b513e4c2098e1d8.exe windows x86
c8428c4f0ef53d6729aa96dcdec60117
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryW
GetCurrentProcessId
CreateEventW
GlobalFlags
GetCurrentThreadId
ReleaseMutex
ReleaseMutex
HeapCreate
LocalFree
GetFileTime
GetPrivateProfileStringA
GetDriveTypeA
FindAtomA
lstrlenW
FindClose
InitializeCriticalSection
GetEnvironmentVariableW
IsBadStringPtrW
TlsGetValue
WriteFile
user32
GetKeyboardType
DrawStateW
GetSysColor
CreateWindowExA
GetSysColor
EndDialog
SetFocus
GetClientRect
DispatchMessageA
IsWindow
CallWindowProcW
GetClassInfoA
DrawTextA
rastapi
DeviceDone
DeviceDone
DeviceDone
DeviceDone
DeviceDone
clbcatq
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 62KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE