Static task
static1
Behavioral task
behavioral1
Sample
4cb4221aa34127ec54772ff0d769a867f23b6748df9a1b47c796e84ff2e2000a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4cb4221aa34127ec54772ff0d769a867f23b6748df9a1b47c796e84ff2e2000a.exe
Resource
win10v2004-20220812-en
General
-
Target
4cb4221aa34127ec54772ff0d769a867f23b6748df9a1b47c796e84ff2e2000a
-
Size
222KB
-
MD5
6ce16fbe5021ea8d5031a86d21bce318
-
SHA1
28d3824638c771a32004e39fe044b2ea73d558c0
-
SHA256
4cb4221aa34127ec54772ff0d769a867f23b6748df9a1b47c796e84ff2e2000a
-
SHA512
0bb7105ffd03db24a099c76727924b200d90f63417696012c3d49f6e56908da0df87a8894ea828b03e2661fe04ec6055ccbdb1af4aaf15f989b9b8a6a142b8de
-
SSDEEP
6144:WSMuxraC0S2XtrklZH/qAZHUP0hxakZdS6quzoQwG8qJEr9n:WvuRr0SCtQlZHxeP0hcpazk/
Malware Config
Signatures
Files
-
4cb4221aa34127ec54772ff0d769a867f23b6748df9a1b47c796e84ff2e2000a.exe windows x86
7de9898b36ca9f546902627c7d13745a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ExtractAssociatedIconA
DragQueryFile
SHBrowseForFolder
SHGetNewLinkInfo
SHFormatDrive
RealShellExecuteA
SHBrowseForFolderA
comdlg32
PrintDlgA
GetFileTitleW
ChooseFontA
PageSetupDlgA
GetOpenFileNameA
PageSetupDlgW
FindTextW
GetSaveFileNameA
GetFileTitleA
GetSaveFileNameW
ReplaceTextW
FindTextA
ChooseFontW
ChooseColorA
ChooseColorW
ReplaceTextA
LoadAlterBitmap
user32
RealGetWindowClass
SetMenuInfo
SwitchToThisWindow
DefFrameProcA
EnumWindows
SetDoubleClickTime
RedrawWindow
CreateAcceleratorTableW
MenuItemFromPoint
BringWindowToTop
TrackPopupMenuEx
EnumPropsA
SetClassLongA
LoadIconA
GetParent
DrawAnimatedRects
DlgDirListW
ValidateRect
CallWindowProcA
AppendMenuW
CreateDialogIndirectParamA
gdi32
RealizePalette
SetMetaRgn
ColorMatchToTarget
EqualRgn
GetEnhMetaFileW
GetTextCharset
GetEnhMetaFileHeader
GetMetaFileBitsEx
kernel32
QueryPerformanceCounter
FreeResource
GetDiskFreeSpaceExA
VirtualAlloc
GetCurrentProcess
InterlockedExchange
SetThreadPriority
GetModuleFileNameA
GetCurrentThreadId
SetFileAttributesW
EnumResourceLanguagesW
HeapFree
GetProcAddress
TerminateProcess
GetPrivateProfileStructW
GetConsoleCP
GetSystemTimeAsFileTime
ExitProcess
SetConsoleCP
VirtualQuery
GetCurrentProcessId
SetEvent
HeapAlloc
ReadConsoleOutputCharacterA
CreateProcessA
GetTickCount
GetModuleHandleA
RtlUnwind
HeapReAlloc
LoadLibraryA
Sections
.text Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ