Static task
static1
Behavioral task
behavioral1
Sample
10b3a1b64c6bd4594fbf189912fbaac337c6207aebae2b42dd7148b26d399126.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
10b3a1b64c6bd4594fbf189912fbaac337c6207aebae2b42dd7148b26d399126.exe
Resource
win10v2004-20220812-en
General
-
Target
10b3a1b64c6bd4594fbf189912fbaac337c6207aebae2b42dd7148b26d399126
-
Size
107KB
-
MD5
325ae961a24c3660ed8f0ab149396de5
-
SHA1
2f4f4fb434253c8a788c9ab12b6da6c06e49e075
-
SHA256
10b3a1b64c6bd4594fbf189912fbaac337c6207aebae2b42dd7148b26d399126
-
SHA512
0f9d32a04885018e67c29772ceacbeefaa2ba7c70dbf99a996aae59b2f5dd7f65d36d71caef8aadf2416ae373b4136add672b0d6e7ea81b2841b5b74cbdb94a6
-
SSDEEP
1536:RSPyD2fIz/tZk9cUSxaVXNSvhZlWzjbH++dRxRDFv:RGy/ZkSUSojSobP3vDFv
Malware Config
Signatures
Files
-
10b3a1b64c6bd4594fbf189912fbaac337c6207aebae2b42dd7148b26d399126.exe windows x86
b884e15c8c2647b35dd469ce5f605ad5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerFindFileA
GetFileVersionInfoA
GetFileVersionInfoSizeA
kernel32
GetLocalTime
lstrcpynA
GlobalDeleteAtom
SetErrorMode
lstrlenA
GetDiskFreeSpaceA
GetCurrentThread
GetModuleFileNameA
VirtualAlloc
CloseHandle
LocalAlloc
GetThreadLocale
LoadLibraryA
GetOEMCP
GetProcAddress
ResetEvent
FindFirstFileA
GetModuleHandleA
GetVersionExA
ReadFile
GetStdHandle
FreeLibrary
GetCurrentProcess
EnterCriticalSection
ExitProcess
FreeResource
GetSystemDefaultLangID
GetCPInfo
GlobalFindAtomA
lstrcmpiA
GetProcessHeap
SetEvent
HeapDestroy
SetHandleCount
CreateThread
GetFileSize
CompareStringA
GlobalAlloc
WideCharToMultiByte
WaitForSingleObject
SizeofResource
GetFullPathNameA
GetStringTypeW
MoveFileExA
MulDiv
ExitThread
DeleteCriticalSection
GetCurrentThreadId
RaiseException
SetThreadLocale
SetLastError
GlobalAddAtomA
LocalReAlloc
FindClose
lstrcpyA
SetFilePointer
InitializeCriticalSection
FormatMessageA
HeapAlloc
GetACP
CreateFileA
FindResourceA
EnumCalendarInfoA
VirtualFree
GetLocaleInfoA
LockResource
msvcrt
log
malloc
memcpy
user32
GetDC
GetMenuItemID
DrawIconEx
FindWindowA
EnumWindows
GetPropA
GetClassInfoA
BeginDeferWindowPos
GetSysColorBrush
GetDesktopWindow
GetWindowTextA
EnumChildWindows
GetWindow
EnableWindow
GetActiveWindow
CallNextHookEx
DefMDIChildProcA
GetMenuItemCount
DefFrameProcA
MessageBoxA
DrawTextA
GetKeyState
EnableMenuItem
DrawMenuBar
GetParent
CreateWindowExA
EndPaint
GetClientRect
GetMenuState
FrameRect
GetMessagePos
SetWindowLongA
CreateIcon
IsWindowVisible
GetIconInfo
CreatePopupMenu
CharToOemA
CharNextA
GetSubMenu
HideCaret
SystemParametersInfoA
GetFocus
TrackPopupMenu
ShowWindow
EndDeferWindowPos
FillRect
CharLowerA
DrawFrameControl
GetCursor
EnableScrollBar
CharLowerBuffA
GetMenu
IsWindowEnabled
IsMenu
EnumThreadWindows
DrawEdge
CallWindowProcA
SetWindowPos
CreateMenu
SetTimer
GetMenuItemInfoA
GetCapture
SetWindowTextA
GetClipboardData
GetMenuStringA
Sections
CODE Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 1024B - Virtual size: 754B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE