Static task
static1
Behavioral task
behavioral1
Sample
0a36674ef9dcd31f0670683bdd5fb7d0a3c7d5ccd88d3f2be8542e347a75cb5a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0a36674ef9dcd31f0670683bdd5fb7d0a3c7d5ccd88d3f2be8542e347a75cb5a.exe
Resource
win10v2004-20220901-en
General
-
Target
0a36674ef9dcd31f0670683bdd5fb7d0a3c7d5ccd88d3f2be8542e347a75cb5a
-
Size
189KB
-
MD5
7378c0db575a7c9c7f2c8a25aa0f94e5
-
SHA1
248329d6f301ef2955af22f75a5accca649bc96c
-
SHA256
0a36674ef9dcd31f0670683bdd5fb7d0a3c7d5ccd88d3f2be8542e347a75cb5a
-
SHA512
57134b77a44d5d437392c29867286aa92308630914950774168e79559cf94639f37577006eebe24764aa6f561ac9c0760cfa1f026c0baad565c0c4770cb8e62e
-
SSDEEP
3072:Jf7ITL73E/Sn/eMByCo9x3u8beLiGMJarJOjcMVfqxlLamyQmmug9lmIvkOLhcJy:x+L73H/ex+ueelISfVfMkVk9k+hE
Malware Config
Signatures
Files
-
0a36674ef9dcd31f0670683bdd5fb7d0a3c7d5ccd88d3f2be8542e347a75cb5a.exe windows x86
51e351c35302a21166f376155d92020d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowTextA
EqualRect
DefWindowProcA
LoadBitmapA
IsWindowVisible
SetClassLongA
SetClipboardData
OffsetRect
GetDesktopWindow
FillRect
CreateWindowExA
PostQuitMessage
LoadCursorA
GetKeyNameTextA
LoadKeyboardLayoutA
DeleteMenu
TranslateMessage
GetWindowDC
ReleaseCapture
GetKeyboardType
MoveWindow
GetClassNameA
GetClipboardData
SetMenu
ScrollWindow
IsWindow
DrawIcon
GetMenuStringA
ChildWindowFromPoint
OemToCharA
RegisterWindowMessageA
DestroyIcon
IntersectRect
TrackPopupMenu
ActivateKeyboardLayout
wsprintfA
GetLastActivePopup
GetMenuItemCount
LoadStringA
EmptyClipboard
GetMenuItemID
SendMessageA
SetWindowTextA
MapVirtualKeyA
ClientToScreen
SetWindowLongW
GetMessagePos
DefFrameProcA
EndPaint
IsRectEmpty
GetSystemMetrics
SetTimer
GetDCEx
InsertMenuA
FindWindowA
DrawIconEx
SetScrollInfo
CreateIcon
EnableScrollBar
RegisterClassA
EnableWindow
DrawAnimatedRects
GetCursorPos
RemoveMenu
kernel32
SetFilePointer
lstrcatA
FindFirstFileA
LoadLibraryExA
SetEndOfFile
DeleteCriticalSection
ResetEvent
EnumCalendarInfoA
GetProcessHeap
GetLastError
FormatMessageA
GetFileSize
GetLocaleInfoA
GlobalAlloc
GetProcAddress
VirtualAllocEx
WideCharToMultiByte
SetThreadLocale
GetTickCount
CompareStringA
GlobalDeleteAtom
ExitThread
GetCurrentThread
LockResource
CreateThread
FreeLibrary
VirtualFree
SizeofResource
VirtualAlloc
CreateFileA
GlobalAddAtomA
GetCurrentProcessId
InitializeCriticalSection
WaitForSingleObject
GetDiskFreeSpaceA
HeapAlloc
GetStringTypeW
GlobalFindAtomA
HeapFree
RaiseException
GetDateFormatA
SetErrorMode
GetCommandLineA
ExitProcess
lstrcmpiA
GetModuleHandleW
GetThreadLocale
MoveFileA
DeleteFileA
GetModuleFileNameA
GetACP
GetCurrentThreadId
LoadLibraryA
HeapDestroy
GetModuleHandleA
lstrlenA
Sections
CODE Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 127KB - Virtual size: 206KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ