Static task
static1
Behavioral task
behavioral1
Sample
d38bf9da28e84cacaddf7c0b75e14a3ff59387b84f83154d8add8bc5591bc646.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d38bf9da28e84cacaddf7c0b75e14a3ff59387b84f83154d8add8bc5591bc646.exe
Resource
win10v2004-20220812-en
General
-
Target
d38bf9da28e84cacaddf7c0b75e14a3ff59387b84f83154d8add8bc5591bc646
-
Size
340KB
-
MD5
9f400ff85cb3eb0633d5000d1a75df18
-
SHA1
55c6b1037e4c96e3e3cdf20a20eb08130ba791dc
-
SHA256
d38bf9da28e84cacaddf7c0b75e14a3ff59387b84f83154d8add8bc5591bc646
-
SHA512
f73bad08f6861c067ccc2caba5ebffc2bbae1c6782c22cc7130f7c02f84fa22e5426cb395741a14ba729980a882b87db9958495bacd2a273423267069bdbeef4
-
SSDEEP
3072:+xbg7IfiFttZ3FKe9V1JIeuG1iXreFS2IdNWm/XvOqPuM0seKw+TKfJ+SKHes7+M:+xgUcZVY7G66IdE8GPQeKD+x+SS3TEQ1
Malware Config
Signatures
Files
-
d38bf9da28e84cacaddf7c0b75e14a3ff59387b84f83154d8add8bc5591bc646.exe windows x86
3296e7e384fe855567681bcb0f77cf4b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
CommandLineToArgvW
kernel32
TlsAlloc
VirtualQueryEx
ReadProcessMemory
GetThreadContext
CreateProcessA
OutputDebugStringA
WideCharToMultiByte
GetCommandLineW
GetModuleFileNameA
TerminateProcess
WaitForSingleObject
ResumeThread
SetThreadContext
WriteProcessMemory
GetProcAddress
GetModuleHandleA
VirtualProtectEx
VirtualAllocEx
VirtualAlloc
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetLastError
MultiByteToWideChar
ReadFile
SetFilePointer
RaiseException
RtlUnwind
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
HeapSize
CloseHandle
CreateFileA
InitializeCriticalSection
LoadLibraryA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEndOfFile
user32
MessageBoxA
Sections
.text Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Smiley Size: 4KB - Virtual size: 240B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
. Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
. Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE