Static task
static1
Behavioral task
behavioral1
Sample
d487ec0a6c3df0dec34d8847563881eb73301761585c2585839d8db47c70c74b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d487ec0a6c3df0dec34d8847563881eb73301761585c2585839d8db47c70c74b.exe
Resource
win10v2004-20221111-en
General
-
Target
d487ec0a6c3df0dec34d8847563881eb73301761585c2585839d8db47c70c74b
-
Size
76KB
-
MD5
34db2446b5674e271ca94de98cf10657
-
SHA1
c1cc4285d8c0ac4df96a279f453940d319d24a34
-
SHA256
d487ec0a6c3df0dec34d8847563881eb73301761585c2585839d8db47c70c74b
-
SHA512
50a714c14537d90a061bfc8317155ea4f9e17ba0aedb9b122466aa40577658488e2a442c777998c8890f6561798c0051dba19708a7fb875869a59e8a18afc698
-
SSDEEP
1536:jeAZLLL1GXAQ5k8OvWNfk3QjWq6NmOaDraK/pdQn6:OQB8OW6NmOa/aK/8n6
Malware Config
Signatures
Files
-
d487ec0a6c3df0dec34d8847563881eb73301761585c2585839d8db47c70c74b.exe windows x86
1748ac06aad9bfcf6f949b349ef34cfd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrStrA
StrStrIA
StrChrA
kernel32
lstrcmpA
AllocConsole
GetStdHandle
WriteFile
WriteConsoleA
ReadFile
ReadConsoleA
MultiByteToWideChar
HeapFree
lstrcmpiA
WideCharToMultiByte
HeapAlloc
SetConsoleMode
GetConsoleMode
GetLastError
GetModuleFileNameA
ExitProcess
Sleep
CreateThread
GetTimeFormatA
CloseHandle
CreateFileA
SizeofResource
LockResource
LoadResource
FindResourceA
lstrlenA
GetFileAttributesA
GetSystemDefaultLCID
GetModuleHandleA
ReadConsoleInputA
lstrcatA
WaitForSingleObject
SetConsoleCursorPosition
FillConsoleOutputCharacterA
GetConsoleScreenBufferInfo
PeekNamedPipe
lstrlenW
CreateProcessA
DuplicateHandle
GetCurrentProcess
CreatePipe
GetVersion
GetExitCodeProcess
TerminateProcess
GetTickCount
SetCurrentDirectoryA
DeleteFileA
ExpandEnvironmentStringsA
GetCurrentDirectoryA
lstrcpyA
lstrcmpW
GetCommandLineA
GetProcessHeap
RemoveDirectoryA
lstrcatW
CreateDirectoryA
GetTempPathA
user32
GetDesktopWindow
CharLowerA
IsCharAlphaNumericA
GetParent
DialogBoxParamA
CharToOemA
MessageBoxA
GetForegroundWindow
GetWindowRect
CopyRect
OffsetRect
SetWindowPos
LoadStringA
SetDlgItemTextA
GetDlgItem
SetFocus
GetDlgItemTextA
EndDialog
wsprintfA
advapi32
RegQueryValueExA
RegCloseKey
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExW
ole32
CoUninitialize
CoGetObject
CLSIDFromProgID
CoCreateInstance
CoInitialize
oleaut32
VariantTimeToSystemTime
VarBstrFromCy
VarBstrFromR4
VarBstrFromR8
VarBstrFromDec
SafeArrayUnaccessData
LoadTypeLi
SysFreeString
VariantInit
SysAllocString
DispInvoke
DispGetIDsOfNames
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
SysStringLen
SafeArrayAccessData
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ