Static task
static1
Behavioral task
behavioral1
Sample
ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe
Resource
win7-20220812-en
General
-
Target
ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958
-
Size
286KB
-
MD5
53498dc18399969e72d822725a51de4f
-
SHA1
66d13cb69a88262c70250a61cdff34efa9d97c92
-
SHA256
ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958
-
SHA512
be6e5fc813b9a2af3cdc3fe08b4c77a96fff8b661a564ba7b06f64d3f7a4b3a009b2653492273c9b3a0e1ab0709f618578f0350279084982be6001192e3b2e14
-
SSDEEP
6144:og1Ounb2ejB/7oTsjW6rN0Ubg67IlQOPscRueRnqn7:ljVBEAjWseTRnq
Malware Config
Signatures
Files
-
ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe windows x86
c7b997bc00288f3e27837a7f98660adc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
shell32
ShellExecuteA
Shell_NotifyIconA
kernel32
GetSystemTimeAsFileTime
GlobalFindAtomW
GetTickCount
GetStartupInfoA
GetLocaleInfoW
UnhandledExceptionFilter
VirtualProtect
InterlockedExchange
SetUnhandledExceptionFilter
GetCurrentThreadId
InterlockedCompareExchange
IsDebuggerPresent
GetModuleHandleW
EnumResourceLanguagesA
GetCurrentProcess
GetCurrentProcessId
GetPrivateProfileSectionW
TerminateProcess
LocalAlloc
FoldStringW
QueryPerformanceCounter
GetProcessHeap
DeleteFileW
oleacc
CreateStdAccessibleObject
shlwapi
GetAcceptLanguagesA
PathFindExtensionW
PathCreateFromUrlW
UrlCreateFromPathW
PathAppendW
UrlUnescapeW
PathRemoveFileSpecW
StrCmpIW
PathIsRelativeW
PathCombineW
Sections
.text Size: 145KB - Virtual size: 276KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 137KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ