Static task
static1
Behavioral task
behavioral1
Sample
da9be24fb84f5627d35906ed91c1bcc66de19097807db693f1705311c57d27f4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
da9be24fb84f5627d35906ed91c1bcc66de19097807db693f1705311c57d27f4.exe
Resource
win10v2004-20220901-en
General
-
Target
da9be24fb84f5627d35906ed91c1bcc66de19097807db693f1705311c57d27f4
-
Size
15KB
-
MD5
4f205018f01837369ae28a2bf8504e01
-
SHA1
6d5b78305d5e060a0c2da33fb0c372f9d1191f80
-
SHA256
da9be24fb84f5627d35906ed91c1bcc66de19097807db693f1705311c57d27f4
-
SHA512
5f49f510d9d88c3a99e22dbf2da4e632787645dc65e9b628b6500157b12ed076de2b966b1cc7b7498e155f714cda3db72ac067292cf0fb19b4ce859ae223bea0
-
SSDEEP
384:SQ2JdxDp5WecWDQyl1QDscSOg6O16gs53JN6U6:Jedx/hcWpWDsiOUgyg
Malware Config
Signatures
Files
-
da9be24fb84f5627d35906ed91c1bcc66de19097807db693f1705311c57d27f4.exe windows x86
61095461e54f1dc64ff8df00c31ab61a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
AttachThreadInput
GetDlgItemTextW
SendMessageA
DdeSetUserHandle
ToAscii
wsprintfW
SetSystemTimer
ntdll
RtlGetFullPathName_U
_stricmp
RtlSubtreeSuccessor
LdrEnumResources
NtSetThreadExecutionState
RtlNewSecurityObject
shlwapi
PathRemoveFileSpecA
PathUndecorateA
UrlCompareW
UrlCanonicalizeA
SHSkipJunction
PathCanonicalizeA
kernel32
VirtualFree
GetFileAttributesExA
MoveFileWithProgressA
QueryPerformanceCounter
EnumResourceNamesW
VerSetConditionMask
FindNextVolumeW
oleaut32
VarUI1FromBool
VarR4FromStr
VarI1FromDate
VarCyCmpR8
OleCreatePropertyFrame
VarBstrFromDate
Sections
.text Size: 9KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE