Static task
static1
Behavioral task
behavioral1
Sample
7d257bb9cffb880f1129e80484100d717a78c89ffbad3b65f97dd8543d2647d8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7d257bb9cffb880f1129e80484100d717a78c89ffbad3b65f97dd8543d2647d8.exe
Resource
win10v2004-20220812-en
General
-
Target
7d257bb9cffb880f1129e80484100d717a78c89ffbad3b65f97dd8543d2647d8
-
Size
151KB
-
MD5
01a26551730e2ef54deee01f04184837
-
SHA1
d2aa90d6d50fa7186dd321c6754b0f80f6a37abe
-
SHA256
7d257bb9cffb880f1129e80484100d717a78c89ffbad3b65f97dd8543d2647d8
-
SHA512
6b57d7f903b82a10c955e6ac7c6f09d5fb0d0ccdd255dcabff1348f1bd6c235c320e6748313315ecec681f77384e7c93ee7f150a38f79f9a5ab698534b2a2ded
-
SSDEEP
1536:ct4srl50GfttyQ/EuEOX1AQ8NdvMlRkNIja8WuFAAFsJsU6ksghquSe4xltWI/65:cusd7XE21AQ8NaPjj5vPJkjqPX10SuQ
Malware Config
Signatures
Files
-
7d257bb9cffb880f1129e80484100d717a78c89ffbad3b65f97dd8543d2647d8.exe windows x86
1f3711531719d6ec0243ed026f7c8e88
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
TranslateMessage
ShowWindow
GetDC
GetDesktopWindow
GetSystemMetrics
DispatchMessageA
kernel32
GetOEMCP
SetLastError
SetCurrentDirectoryA
GetCurrentProcess
GetUserDefaultLangID
VirtualAlloc
GetCurrentProcessId
GetCommandLineW
GetModuleHandleW
VirtualFree
gdi32
GetStockObject
GetPixel
DeleteDC
LineTo
Rectangle
PatBlt
CreateSolidBrush
GetClipBox
GetObjectA
DeleteObject
glu32
gluTessCallback
comctl32
InitCommonControls
Sections
.text Size: 1024B - Virtual size: 1015B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Qlelglvj Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ