Static task
static1
Behavioral task
behavioral1
Sample
d095d3bb78aa564293d018623d40c1c32abd082ab0d379aed5497ae5aa7d309d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d095d3bb78aa564293d018623d40c1c32abd082ab0d379aed5497ae5aa7d309d.exe
Resource
win10v2004-20220812-en
General
-
Target
d095d3bb78aa564293d018623d40c1c32abd082ab0d379aed5497ae5aa7d309d
-
Size
140KB
-
MD5
df9e701e44f7bb5a2b284ffd0eafa30c
-
SHA1
2e0419ec887c654697d05285ae8411774872c00c
-
SHA256
d095d3bb78aa564293d018623d40c1c32abd082ab0d379aed5497ae5aa7d309d
-
SHA512
7e440820d640838508b951fcba9d2e2af5c06eee93a6e068f67da04c5848b8fe9d0d4c6ba8b2f0ee0b6b63ed488eddfc6d7c17d758ce649a51c70cfa281f2aa1
-
SSDEEP
3072:wyi6fp7LbUILUzVbRy+c1PF74pZOouaphbH:w76R7kILa1y++4Zppp
Malware Config
Signatures
Files
-
d095d3bb78aa564293d018623d40c1c32abd082ab0d379aed5497ae5aa7d309d.exe windows x86
d5c58f9342cf4651fbb2fdd0993a0718
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetScrollInfo
SetWindowTextA
GetActiveWindow
GetThreadDesktop
IsCharAlphaA
EnumWindows
SetDlgItemTextA
GetWindowThreadProcessId
EnumDisplaySettingsA
DialogBoxParamA
MessageBoxA
ole32
CoGetCallerTID
comctl32
ord17
advapi32
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
kernel32
DeleteCriticalSection
SetFileAttributesA
GetLocalTime
InitializeCriticalSection
HeapCreate
IsBadWritePtr
ExitProcess
HeapAlloc
HeapFree
GetDateFormatA
HeapDestroy
GetTickCount
LocalAlloc
FreeLibrary
LoadLibraryA
GetProcAddress
LocalFree
IsValidLocale
GetTimeFormatA
IsBadReadPtr
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 241KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 856B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ