Static task
static1
Behavioral task
behavioral1
Sample
dcae0728d39355a476c672eda8289ba2667c130ad0146212871e2cb9a20f8b5a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dcae0728d39355a476c672eda8289ba2667c130ad0146212871e2cb9a20f8b5a.exe
Resource
win10v2004-20220812-en
General
-
Target
dcae0728d39355a476c672eda8289ba2667c130ad0146212871e2cb9a20f8b5a
-
Size
18KB
-
MD5
7d8ffa044b1429e31c2b8fd51a5ecc6d
-
SHA1
d7c8ee706d8103f1a09d9fc0de1a8ac2c8b97dc5
-
SHA256
dcae0728d39355a476c672eda8289ba2667c130ad0146212871e2cb9a20f8b5a
-
SHA512
d062ff6fa62d9f29849cb106036051caaf9314b5782d235a384a68dd36ff907d8a171b276fac4b820a85e4573e6fe4b107c61a2ca42fbc4f399db7e9dbaf39ea
-
SSDEEP
384:CuhZvDN4T1e1PRIXooQSWGYMy0P1RKRNU4SKcAUA3sNluBA/ZemHajo:CuLCe3ImBMlfKLgAtuuBDG
Malware Config
Signatures
Files
-
dcae0728d39355a476c672eda8289ba2667c130ad0146212871e2cb9a20f8b5a.exe windows x86
a68a29d66b4edcd1c3fbc71cdd3b4503
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
FormatMessageA
SetLastError
GetOEMCP
TerminateProcess
GetDriveTypeA
CloseHandle
DeleteFileA
OpenMutexA
FindClose
FindFirstFileA
GetSystemDirectoryA
MultiByteToWideChar
WideCharToMultiByte
OpenProcess
CreateMutexA
IsBadReadPtr
FindNextFileA
GetLocaleInfoA
ReleaseMutex
ExitProcess
LocalFree
ReadFile
CreateFileA
VirtualAlloc
GetModuleHandleA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
IsDebuggerPresent
user32
GetMessageA
MessageBoxA
wsprintfA
TranslateMessage
ole32
CoInitialize
CoUninitialize
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ