Static task
static1
Behavioral task
behavioral1
Sample
d243157ef0f42474f4dc3acb2ff797d22e6c52cf1544d983d36fa25765979520.exe
Resource
win7-20220812-en
General
-
Target
d243157ef0f42474f4dc3acb2ff797d22e6c52cf1544d983d36fa25765979520
-
Size
147KB
-
MD5
2b38507533397a31e8640bd05f2305dc
-
SHA1
6f01507150b5fa3b185969138a90f0708ee79cb5
-
SHA256
d243157ef0f42474f4dc3acb2ff797d22e6c52cf1544d983d36fa25765979520
-
SHA512
c53f23a54d30dbe0543b02107fe20834a60869ccfc0d8fe0323460602f7c8afeeeee646373f83030819afcfa796926dcd71a03343bccc80d1676c5e46bd84692
-
SSDEEP
3072:t3TUxCtPXwzivYLNGO8KapCjcxUqrWEAxzX27rn1:hTUIPXULLR8XAqCrJX2n
Malware Config
Signatures
Files
-
d243157ef0f42474f4dc3acb2ff797d22e6c52cf1544d983d36fa25765979520.exe windows x86
22e026981847ab8df7e61964f39dacfe
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
GetCommandLineW
GetCurrentThread
GetLastError
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetVersion
HeapAlloc
HeapFree
InterlockedExchange
LoadLibraryA
FreeLibrary
LocalFree
MultiByteToWideChar
RaiseException
SetCurrentDirectoryA
SetErrorMode
SetThreadPriority
lstrcatA
lstrcpyA
lstrlenA
lstrlenW
LoadLibraryW
VirtualAlloc
FormatMessageA
ExitProcess
CreateMutexA
CompareStringA
LocalAlloc
CloseHandle
user32
IsIconic
IsWindowVisible
MessageBoxA
SendMessageTimeoutA
SetForegroundWindow
ShowWindow
LoadIconA
LoadCursorA
LoadCursorW
RegisterClassExW
LoadIconW
GetWindow
GetParent
GetDesktopWindow
GetClassNameA
FindWindowA
GetWindowThreadProcessId
gdi32
GetStockObject
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ