Static task
static1
Behavioral task
behavioral1
Sample
df2c4664485bbfbe6e4182aa22056c58d47ce1cd70fc61a2bee46fe911417e75.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
df2c4664485bbfbe6e4182aa22056c58d47ce1cd70fc61a2bee46fe911417e75.exe
Resource
win10v2004-20221111-en
General
-
Target
df2c4664485bbfbe6e4182aa22056c58d47ce1cd70fc61a2bee46fe911417e75
-
Size
592KB
-
MD5
edc634cfd55e75c430e025d79ccde66a
-
SHA1
0c74198c80211b03fc675695d1b141257469d8c2
-
SHA256
df2c4664485bbfbe6e4182aa22056c58d47ce1cd70fc61a2bee46fe911417e75
-
SHA512
08b6e9d71e7880c7a03d9e4e49383ec59544d0687d05b085f32ff24e90c89285457e0e4f3d51651cf5747de099198dcc03b0f370d0e246e62ede5a5d9d8bf734
-
SSDEEP
12288:LqV0vkHOSAX3gX/7TmJya/gZaL6Z5TMSI0wLXJamWHjYjDcW:LPkHGgX/7yJya/tW5TMdDXJamAjYjn
Malware Config
Signatures
Files
-
df2c4664485bbfbe6e4182aa22056c58d47ce1cd70fc61a2bee46fe911417e75.exe windows x86
f89b9281165610bb3f30ce7da51d382a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
OleCreateDefaultHandler
CoTaskMemAlloc
OleTranslateAccelerator
CoDisconnectObject
CoGetCurrentProcess
CoLoadLibrary
OleIsRunning
OleRegGetUserType
CoGetObject
OleMetafilePictFromIconAndLabel
CoCreateFreeThreadedMarshaler
OleDoAutoConvert
CoRegisterPSClsid
OleGetAutoConvert
OleCreateMenuDescriptor
CoInstall
CoGetObjectContext
CoRevokeClassObject
OleCreateLinkFromData
msvcrt
atoi
_wsplitpath
fseek
_beginthreadex
_wcsicmp
_pctype
_stat
strcpy
strcspn
strtoul
strspn
_initterm
strlen
_waccess
_wfullpath
_access
iswctype
strstr
_adjust_fdiv
fclose
gdi32
CreateSolidBrush
SetMapMode
EndPage
Polyline
GetBkColor
Rectangle
SetBkMode
SetROP2
SelectObject
DeleteObject
GetObjectA
SelectClipRgn
ExtTextOutA
SetBkColor
CreateFontIndirectA
CreateDIBSection
EndDoc
StartDocA
GetStockObject
GetDeviceCaps
kernel32
MapViewOfFile
ReadProcessMemory
GetEnvironmentStringsW
RaiseException
GlobalReAlloc
GetEnvironmentVariableA
TlsSetValue
GetConsoleCP
SetHandleCount
GetCurrentProcessId
GetEnvironmentStrings
DeleteFileA
LockResource
CreateFileA
WaitForMultipleObjects
GetLocaleInfoW
GetACP
HeapSize
SetConsoleCtrlHandler
DuplicateHandle
lstrcpyA
GetStringTypeW
ExpandEnvironmentStringsA
GetTimeZoneInformation
EnumSystemLocalesA
TlsGetValue
CreateEventA
ResumeThread
advapi32
AddAccessAllowedAce
IsValidSecurityDescriptor
GetSidSubAuthorityCount
StartServiceA
FreeSid
MapGenericMask
SetKernelObjectSecurity
CopySid
GetSecurityInfo
GetLengthSid
LookupAccountSidA
AllocateAndInitializeSid
SetSecurityInfo
RegOpenKeyA
LookupPrivilegeValueA
user32
DefWindowProcA
SetFocus
PeekMessageA
CreateWindowExA
RegisterWindowMessageA
CreatePopupMenu
GetKeyState
PostQuitMessage
TranslateAcceleratorA
GetMenuItemID
LoadAcceleratorsA
CheckDlgButton
DeleteMenu
SetClipboardData
ReleaseDC
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 936B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 346B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ