Static task
static1
Behavioral task
behavioral1
Sample
621089552cbea6b0a9bbb7b185077201b3d454af32ffc332cf6ac406bf55310a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
621089552cbea6b0a9bbb7b185077201b3d454af32ffc332cf6ac406bf55310a.exe
Resource
win10v2004-20230220-en
General
-
Target
621089552cbea6b0a9bbb7b185077201b3d454af32ffc332cf6ac406bf55310a
-
Size
281KB
-
MD5
8a8c2b09dea371bd6ac0b4bf69654558
-
SHA1
dc4175b4a1a412a099daf65dea941635ddd142e3
-
SHA256
621089552cbea6b0a9bbb7b185077201b3d454af32ffc332cf6ac406bf55310a
-
SHA512
354ce0ca8746f46d48fe29261a62109fea9ca3ab3dcfb249f3f8980e8263e24146755837fcfe4e922bed62329f8f4e1b84194b898765b280b882025bf5b2f889
-
SSDEEP
6144:eZiyUONuDlfaPQx6BPpLoWjQr5bxtGiN0Q9C9HBo5uulyv1gggT:eUHONuGQcLLoWjQPt/lg9eO
Malware Config
Signatures
Files
-
621089552cbea6b0a9bbb7b185077201b3d454af32ffc332cf6ac406bf55310a.exe windows x86
7080b8d94a427465e8851e1d182e93a2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
dhplay
_PLAY_SetWaterMarkCallBackEx@12
user32
DeferWindowPos
gdi32
CreateRectRgn
comdlg32
GetFileTitleW
winspool.drv
OpenPrinterW
advapi32
RegEnumKeyW
shell32
SHGetPathFromIDListW
comctl32
ImageList_GetIconSize
shlwapi
PathIsUNCW
oledlg
OleUIBusyW
ole32
CoRegisterMessageFilter
oleaut32
SysAllocString
Sections
.text Size: 253KB - Virtual size: 764KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE