Static task
static1
Behavioral task
behavioral1
Sample
13c8fa72786e4a69573bc969133c07a288eef5cf472465533de0d03436f5b0ff.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
13c8fa72786e4a69573bc969133c07a288eef5cf472465533de0d03436f5b0ff.exe
Resource
win10v2004-20220901-en
General
-
Target
13c8fa72786e4a69573bc969133c07a288eef5cf472465533de0d03436f5b0ff
-
Size
59KB
-
MD5
2e6d974f080a3724182e71587352f7bc
-
SHA1
3835d16586a70676dd42228cc98f51b123b2b0b2
-
SHA256
13c8fa72786e4a69573bc969133c07a288eef5cf472465533de0d03436f5b0ff
-
SHA512
df839f77c9c08d2b7e6a36fd6da4b5a616510853e486c9d65ccf387c45206e3f5c4307ef731b4f4f32b47e68de87d740ad30ba853cae2245b73b7e19ae257d02
-
SSDEEP
1536:i1P7Q6W7nsgzjZ0LIzonPwXruu77f3vJW2yEna:iYWSruuHfRXyEa
Malware Config
Signatures
Files
-
13c8fa72786e4a69573bc969133c07a288eef5cf472465533de0d03436f5b0ff.exe windows x86
967d12a7143f5d63e3a1948cd6c0b469
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsGetValue
CreateEventW
GetConsoleAliasA
HeapCreate
ReadFile
FindAtomA
GetPrivateProfileStringA
GetCurrentProcessId
GetCurrentThreadId
GetModuleHandleA
EnterCriticalSection
EnumCalendarInfoA
FindClose
GetNumberFormatA
SetLastError
LocalFree
GetDriveTypeW
lstrlenW
ResumeThread
LocalFlags
user32
GetKeyState
IsWindow
GetKeyboardType
GetSysColor
GetMenuInfo
SetFocus
DispatchMessageA
DrawTextA
DispatchMessageA
GetClassInfoA
GetCursorInfo
CallWindowProcW
GetClientRect
stclient
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
ntshrui
IsPathSharedA
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ