Static task
static1
Behavioral task
behavioral1
Sample
4f2a7cb5dc96e30ee7e8763248a2809f79e9638de8213604891cd5ea70d46e40.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4f2a7cb5dc96e30ee7e8763248a2809f79e9638de8213604891cd5ea70d46e40.exe
Resource
win10v2004-20220812-en
General
-
Target
4f2a7cb5dc96e30ee7e8763248a2809f79e9638de8213604891cd5ea70d46e40
-
Size
259KB
-
MD5
696cfa803f337b56049385dcf6a21332
-
SHA1
16737f25d7c97af44d765735345c8f354cb7452b
-
SHA256
4f2a7cb5dc96e30ee7e8763248a2809f79e9638de8213604891cd5ea70d46e40
-
SHA512
ec2a64c80b410033c7a4d85df6a0775ad40d94e41ddb09b8508322d569406098a6b25e2de85d6828b3c54b3170f4f407e5c298c5edcc00391ddd5242cbfa8883
-
SSDEEP
6144:9tgVcdJZCqufQdNxIenEJdeSOEudeldr:9tgVWfdaE6dJY1EucD
Malware Config
Signatures
Files
-
4f2a7cb5dc96e30ee7e8763248a2809f79e9638de8213604891cd5ea70d46e40.exe windows x86
1e1c8799d3880d7fb0da6cfb4be9e413
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
malloc
memcpy
log10
user32
ShowWindow
GetActiveWindow
UnregisterClassA
CharUpperBuffA
SetScrollPos
GetKeyboardState
GetSysColorBrush
GetWindow
DestroyCursor
GetWindowLongW
EnableScrollBar
AdjustWindowRectEx
RegisterClipboardFormatA
SetWindowPos
IsDialogMessageW
DrawTextA
IsDialogMessageA
RedrawWindow
GetCursor
GetDlgItem
GetKeyboardType
GetMenuItemCount
GetClientRect
GetMenuState
kernel32
GetStdHandle
GetVersionExA
HeapDestroy
WaitForSingleObject
GetFileType
GetStringTypeA
GetEnvironmentStrings
GlobalAddAtomA
GetLocalTime
GetDateFormatA
CompareStringA
GetStartupInfoA
GetLastError
SetFilePointer
GetUserDefaultLCID
MulDiv
SizeofResource
GetCommandLineA
DeleteFileA
lstrcpynA
GetDiskFreeSpaceA
FindClose
GetSystemDefaultLangID
LocalReAlloc
DeleteCriticalSection
CreateEventA
GetTickCount
SetErrorMode
LoadLibraryExA
GetFileSize
GetModuleFileNameA
SetHandleCount
MoveFileExA
VirtualAlloc
LoadResource
SetThreadLocale
GetLocaleInfoA
CloseHandle
GetModuleHandleA
LocalAlloc
GetACP
GetCurrentProcess
lstrcatA
VirtualAllocEx
FindFirstFileA
ExitThread
FindResourceA
SetEndOfFile
GetThreadLocale
HeapFree
CreateFileA
EnterCriticalSection
GetCPInfo
WriteFile
GetProcAddress
GetVersion
Sleep
CreateThread
GlobalFindAtomA
VirtualQuery
GetFileAttributesA
lstrlenA
lstrcpyA
VirtualFree
GetOEMCP
SetEvent
ReadFile
LockResource
ResetEvent
RaiseException
ExitProcess
HeapAlloc
GetCurrentProcessId
FreeLibrary
LoadLibraryA
MoveFileA
FormatMessageA
GlobalAlloc
GetProcessHeap
GetCurrentThreadId
GetCurrentThread
WideCharToMultiByte
EnumCalendarInfoA
FreeResource
GetFullPathNameA
LocalFree
lstrcmpA
InitializeCriticalSection
Sections
CODE Size: 248KB - Virtual size: 248KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 262B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE