Static task
static1
Behavioral task
behavioral1
Sample
dd8304f2af90c90902981a8bede2d75231d1ee50ed07b5256f640602ced123be.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
dd8304f2af90c90902981a8bede2d75231d1ee50ed07b5256f640602ced123be.exe
Resource
win10v2004-20221111-en
General
-
Target
dd8304f2af90c90902981a8bede2d75231d1ee50ed07b5256f640602ced123be
-
Size
100KB
-
MD5
142b613234dc02cf0426812602dcec56
-
SHA1
ca26ebab1c5273cc509b27f4fc991cf7ba5f9b18
-
SHA256
dd8304f2af90c90902981a8bede2d75231d1ee50ed07b5256f640602ced123be
-
SHA512
c23b2f960b4af6285d655344b406cb42567c85425ee138921437c1523cec5cf5b9ae0b13e770c85ea63c28bd18f0d9a75808e6eafc60d77a1cbba1e3667862dc
-
SSDEEP
3072:meX+y9eCIQMrcwOf3aZEXy0HifOGWtU4C:mi54CsjKXy0CmEP
Malware Config
Signatures
Files
-
dd8304f2af90c90902981a8bede2d75231d1ee50ed07b5256f640602ced123be.exe windows x86
6b371078c72a066e43bd55a86835683e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
GetCurrentProcess
GetWindowsDirectoryA
IsBadReadPtr
SetFilePointer
CreateProcessA
DeleteFileA
GetTickCount
GetModuleHandleA
ole32
OleSetContainedObject
OleCreate
CoUninitialize
CoInitialize
user32
DestroyWindow
SetWindowLongA
CreateWindowExA
DefWindowProcA
PostQuitMessage
UpdateWindow
GetWindowLongA
TranslateMessage
MessageBoxA
ShowWindow
DispatchMessageA
advapi32
RegCloseKey
RegSetValueExA
RegDeleteKeyA
shell32
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
Sections
.text Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1006B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ