Static task
static1
Behavioral task
behavioral1
Sample
029382103a696cd96524d1b0c84358fbc23fc5b2bba454f766380e1bff161864.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
029382103a696cd96524d1b0c84358fbc23fc5b2bba454f766380e1bff161864.exe
Resource
win10v2004-20220812-en
General
-
Target
029382103a696cd96524d1b0c84358fbc23fc5b2bba454f766380e1bff161864
-
Size
391KB
-
MD5
080be43e8c2e1766d022d65d6bf7e108
-
SHA1
6148b10e73051b85cb29622a7d7600bca2b9b5d0
-
SHA256
029382103a696cd96524d1b0c84358fbc23fc5b2bba454f766380e1bff161864
-
SHA512
77680a4d405f3f27c92aca7f4f4d1e6acd2269817215cdcd9cbe37c2bb1ad141f96a48d716c67acabf811c112f416447ed681d2c35b6905bbcfb9b017b78f9c0
-
SSDEEP
12288:HM0JRMtHEAJLjpFv6w2K/PkFtlVMHFWg1EOfoMzCc3Sa0n:s0JRMtkAJLjpFvN/ytkjEOfoMWN
Malware Config
Signatures
Files
-
029382103a696cd96524d1b0c84358fbc23fc5b2bba454f766380e1bff161864.exe windows x86
91f23650ea36a886b11fff3f5a9a43b2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
GetFileTime
FindClose
GlobalFlags
CreateEventW
GetPrivateProfileStringA
ReleaseMutex
CloseHandle
IsBadStringPtrW
ReleaseMutex
HeapCreate
TlsGetValue
LocalFree
lstrlenW
GetCurrentThreadId
InitializeCriticalSection
GetEnvironmentVariableW
LoadLibraryW
GetCurrentProcessId
WriteFile
user32
IsWindow
GetClientRect
EndDialog
DispatchMessageA
GetClassInfoA
GetKeyboardType
DrawStateW
GetSysColor
CallWindowProcW
SetFocus
GetSysColor
CreateWindowExA
DrawTextA
qcliprov
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
advapi32
InitializeSid
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 404KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 381KB - Virtual size: 380KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ