Static task
static1
Behavioral task
behavioral1
Sample
0d748b1b65ba16bf1fc653a2c539b21c7f2c1d5947ab5380fa95bb157959d06b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0d748b1b65ba16bf1fc653a2c539b21c7f2c1d5947ab5380fa95bb157959d06b.exe
Resource
win10v2004-20220812-en
General
-
Target
0d748b1b65ba16bf1fc653a2c539b21c7f2c1d5947ab5380fa95bb157959d06b
-
Size
3.4MB
-
MD5
dc36de6477f17b4267afe8d5cfd97a54
-
SHA1
1d0e27541d13ec2c462b6db2a1c7d601c598eb2d
-
SHA256
0d748b1b65ba16bf1fc653a2c539b21c7f2c1d5947ab5380fa95bb157959d06b
-
SHA512
04160f60a910234c33b55dc9b3a4f22907b5ad0d81e644f810661493ebc4a3acd568ff0e603fd65a2988c40da75fcd822cb2ceb2c09d537de6397c8d66dd622c
-
SSDEEP
49152:fgWIY18phSgWBSVw0h8gV0I+Wh+ym+2k+tn8m7bx5TOqUtQ0HU2QI/NRKnbG7MEv:fg61qSgWBSVjR+q+ymdtxpOqAvoAY4
Malware Config
Signatures
Files
-
0d748b1b65ba16bf1fc653a2c539b21c7f2c1d5947ab5380fa95bb157959d06b.exe windows x86
a91160b5af2eba43aad5f630846c53ea
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
user32
UnregisterClassA
gdi32
ExtSelectClipRgn
winmm
waveOutUnprepareHeader
winspool.drv
OpenPrinterA
advapi32
RegCreateKeyExA
shell32
ShellExecuteA
ole32
CLSIDFromProgID
oleaut32
SafeArrayGetDim
comctl32
ImageList_GetImageCount
ws2_32
inet_ntoa
comdlg32
ChooseColorA
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
Sections
.text Size: 2.3MB - Virtual size: 3.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 984KB - Virtual size: 984KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ