Static task
static1
Behavioral task
behavioral1
Sample
9d751b3183688f90e4a8239d785c4a12c696b6480697d40d91e34989d9f61266.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9d751b3183688f90e4a8239d785c4a12c696b6480697d40d91e34989d9f61266.exe
Resource
win10v2004-20220812-en
General
-
Target
9d751b3183688f90e4a8239d785c4a12c696b6480697d40d91e34989d9f61266
-
Size
22KB
-
MD5
baf748cefaff305456f9d969232277fe
-
SHA1
1802bc532581bbe03391bb9de2a088a4c7f37c68
-
SHA256
9d751b3183688f90e4a8239d785c4a12c696b6480697d40d91e34989d9f61266
-
SHA512
98c5275859359e15d6d8b91ddf73b2248f503528f60c26bead028c021491aa32318f64dcb1b630d296ff3fa03d636ed2f1012c523bd43ad18a9be7fd8cdc535b
-
SSDEEP
192:C++S118sjKoIe1H1UYpakizKvH9Gtc0gF66jRUdBVRZ4fGKBypOY0rZ9ORiB:n+S1ZD91HhGNCdjRS3uuKByOjrZ9ORi
Malware Config
Signatures
Files
-
9d751b3183688f90e4a8239d785c4a12c696b6480697d40d91e34989d9f61266.exe windows x86
1e4725bfb49d11838f97ef27c551abf8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
MoveToEx
SetTextColor
LineTo
CreateCompatibleDC
ExtTextOutW
DeleteObject
PatBlt
kernel32
ExitProcess
InterlockedDecrement
InitializeCriticalSection
GetCurrentProcess
GetACP
GetCommandLineA
MultiByteToWideChar
VirtualAlloc
GetCommandLineA
CreateThread
LoadLibraryExW
user32
PtInRect
IsWindow
GetMessageW
RegisterClassW
ScreenToClient
KillTimer
advapi32
CloseServiceHandle
CloseServiceHandle
RegQueryInfoKeyW
RegSetValueExW
RegSetValueExW
RegQueryInfoKeyW
FreeSid
RegOpenKeyExW
FreeSid
RegQueryValueExA
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ