Static task
static1
Behavioral task
behavioral1
Sample
de8e5c5f4c44892d57d3dfb8bf8c29ace9eaaf6009568f17ef7960161f7cb4c4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
de8e5c5f4c44892d57d3dfb8bf8c29ace9eaaf6009568f17ef7960161f7cb4c4.exe
Resource
win10v2004-20220901-en
General
-
Target
de8e5c5f4c44892d57d3dfb8bf8c29ace9eaaf6009568f17ef7960161f7cb4c4
-
Size
10KB
-
MD5
83eb862119acf7f5a054f01cd5ef9f90
-
SHA1
8b2c5fa86cd537308e975e14a4a7033c3aaf9efe
-
SHA256
de8e5c5f4c44892d57d3dfb8bf8c29ace9eaaf6009568f17ef7960161f7cb4c4
-
SHA512
a52127ea141984d547ffbe52d097c4d18be9321dae4dec9cb6b3dc7f655a4a45a16723b9db6d970cc77803a566d4d137c6d3906344afcafee0ecd21b45fdda6c
-
SSDEEP
192:9D2U6q/SdQNm3o3m9l+mE8PmXuSKHBhgJEtmcK7rGE76mmX4RWU:9Dd5Hm3ym9l+mZPmXnKHyEuGHuf
Malware Config
Signatures
Files
-
de8e5c5f4c44892d57d3dfb8bf8c29ace9eaaf6009568f17ef7960161f7cb4c4.exe windows x86
6559a7edc8326906e621aea2c3d0a856
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
PeekMessageA
TranslateMessage
DispatchMessageA
LoadCursorA
RegisterClassExA
CharUpperBuffA
RegisterClassA
DefDlgProcA
TranslateAcceleratorA
GetMessageA
LoadAcceleratorsA
LoadIconA
EnableWindow
SetWindowTextA
DefWindowProcA
PostQuitMessage
kernel32
GetStartupInfoA
GetCommandLineA
HeapAlloc
GetModuleHandleA
ExitProcess
CreateThread
lstrcmpiA
EnterCriticalSection
ResetEvent
LeaveCriticalSection
WaitForMultipleObjects
GetTickCount
Sleep
GetProcessHeap
InitializeCriticalSection
CreateEventA
lstrlenA
GetModuleFileNameA
lstrcmpA
lstrcpyA
SetEvent
rasapi32
RasSetEntryPropertiesA
RasEnumEntriesA
RasGetEntryPropertiesA
RasDialA
RasEnumDevicesA
RasHangUpA
RasEnumConnectionsA
RasGetConnectStatusA
RasGetErrorStringA
comctl32
ord17
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE