Static task
static1
Behavioral task
behavioral1
Sample
03a6787f240db6db97e1c3f78c8d5250.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
03a6787f240db6db97e1c3f78c8d5250.exe
Resource
win10v2004-20220901-en
General
-
Target
57c0ec9e4b27ccddc62e2769cfe10db0766d81c6448357600847863dacb480ce
-
Size
63KB
-
MD5
229c50609b255c8062eef10b24cc6b3c
-
SHA1
e59b4ccdbe06528ebac6a16407747744af2745f1
-
SHA256
57c0ec9e4b27ccddc62e2769cfe10db0766d81c6448357600847863dacb480ce
-
SHA512
825305d9c7887194564f8d0c0e6bf9afb5086d1bf73c06204c7339522ce139d25a35eec16a763caf518f5b2570691434c2a3a9a33cbb4a964a648595249f3816
-
SSDEEP
1536:tbdXkGw/wlV2eOcHmE4IfAzLxd1eilMR6D7fIH8o7UYMi1gX:tbZmw32cmJIk9nMR6368o7pS
Malware Config
Signatures
Files
-
57c0ec9e4b27ccddc62e2769cfe10db0766d81c6448357600847863dacb480ce.zip
-
03a6787f240db6db97e1c3f78c8d5250.EXE.exe windows x86
feee1c6a4674eb2b72fff957e6d909fc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThread
GetFileType
FindClose
HeapDestroy
HeapFree
lstrcatA
EnterCriticalSection
SetThreadLocale
GetCommandLineA
lstrcpynA
GlobalAlloc
lstrcpyA
GetVersionExA
SetErrorMode
CreateEventA
SetEndOfFile
GetOEMCP
GetModuleHandleA
ExitThread
InitializeCriticalSection
GetLocalTime
FormatMessageA
SetLastError
ReadFile
CreateThread
CloseHandle
LoadResource
SetEvent
GlobalAddAtomA
GetModuleFileNameA
GetSystemDefaultLangID
GetDateFormatA
MoveFileExA
HeapAlloc
GetVersion
GetFullPathNameA
GetLastError
WideCharToMultiByte
FindFirstFileA
LoadLibraryExA
RaiseException
ExitProcess
GetLocaleInfoA
VirtualAlloc
GetACP
DeleteCriticalSection
GetCPInfo
GlobalDeleteAtom
lstrlenA
LoadLibraryA
WriteFile
GetStdHandle
CreateFileA
MoveFileA
GetCurrentProcessId
SetFilePointer
SizeofResource
FreeResource
Sleep
GetThreadLocale
GetStringTypeA
lstrcmpA
GetProcessHeap
user32
DrawFrameControl
SetWindowPos
DefWindowProcA
SystemParametersInfoA
GetWindowTextA
GetMenuItemCount
GetForegroundWindow
GetWindow
GetLastActivePopup
GetActiveWindow
CallNextHookEx
GetCursorPos
GetMessagePos
IsChild
DrawTextA
IsDialogMessageA
SetWindowTextA
GetSubMenu
DispatchMessageW
DispatchMessageA
CharLowerA
GetMenuState
GetDesktopWindow
CharToOemA
GetSysColor
EnableMenuItem
EnumChildWindows
GetMenuItemInfoA
IsWindowVisible
GetCursor
DrawEdge
GetFocus
GetMenuStringA
EndPaint
FrameRect
EnableWindow
DrawIconEx
GetParent
CreatePopupMenu
GetScrollPos
CharNextA
GetSysColorBrush
GetScrollInfo
EqualRect
CallWindowProcA
GetClassInfoA
GetCapture
GetDCEx
GetPropA
DefMDIChildProcA
DrawIcon
ShowWindow
GetMenuItemID
BeginPaint
GetDlgItem
SetTimer
IsMenu
SetWindowLongA
CreateWindowExA
IsWindowEnabled
EnumThreadWindows
GetIconInfo
GetMenu
ClientToScreen
RegisterClassA
comdlg32
GetFileTitleA
FindTextA
msvcrt
memmove
log
malloc
memcpy
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 1024B - Virtual size: 702B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ