Static task
static1
Behavioral task
behavioral1
Sample
d987740c35217992b62bb6a648144e82ec109ffbb1eca7914783db50a5084a4d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d987740c35217992b62bb6a648144e82ec109ffbb1eca7914783db50a5084a4d.exe
Resource
win10v2004-20220812-en
General
-
Target
d987740c35217992b62bb6a648144e82ec109ffbb1eca7914783db50a5084a4d
-
Size
72KB
-
MD5
7a96d5eb8e773625d258340ee14ee59b
-
SHA1
b0ecc447a53df85ee35ca4b8747b3a3945680498
-
SHA256
d987740c35217992b62bb6a648144e82ec109ffbb1eca7914783db50a5084a4d
-
SHA512
ce0314484e08eec0ef5f36ec7556b8985d66890cf01a1f2036c161a969e8c7d9e24db66b06a84ead7fa5cf4dfdcd3db0098b443077aab81ef418072942111e55
-
SSDEEP
1536:kMP5nnvb/GUPMWLpbQ/UTO7TkiU9OAA5:JnvbeUrcclXM3
Malware Config
Signatures
Files
-
d987740c35217992b62bb6a648144e82ec109ffbb1eca7914783db50a5084a4d.exe windows x86
c0132a05b49063a6810b93ff7112c800
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
GlobalFlags
HeapCreate
FindClose
GetCurrentThreadId
GetDriveTypeA
InitializeCriticalSection
GetPrivateProfileStringA
GetFileTime
lstrlenW
CreateEventW
ReleaseMutex
GetEnvironmentVariableW
FindAtomA
GetCurrentProcessId
LoadLibraryW
LocalFree
IsBadStringPtrW
TlsGetValue
ReleaseMutex
user32
CallWindowProcW
DrawTextA
GetSysColor
DispatchMessageA
CreateWindowExA
IsWindow
SetFocus
GetClassInfoA
DrawStateW
GetKeyboardType
GetClientRect
GetSysColor
EndDialog
rastapi
DeviceDone
DeviceDone
DeviceDone
DeviceDone
DeviceDone
clbcatq
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 62KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE