Static task
static1
Behavioral task
behavioral1
Sample
7362c778b8f54434baac9d9a5eb40fb3ffef897ca3a4d5a166c1ec24e5400034.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7362c778b8f54434baac9d9a5eb40fb3ffef897ca3a4d5a166c1ec24e5400034.exe
Resource
win10v2004-20220901-en
General
-
Target
7362c778b8f54434baac9d9a5eb40fb3ffef897ca3a4d5a166c1ec24e5400034
-
Size
64KB
-
MD5
73630bc337384bedb925a2c02131aab0
-
SHA1
e773318f52bb9288fbd9c88a58077a60261ce845
-
SHA256
7362c778b8f54434baac9d9a5eb40fb3ffef897ca3a4d5a166c1ec24e5400034
-
SHA512
c8ef8f55a6e0da62c1de5cb9ec7ab1124cf4495c226d87f749b8b6c23d4ec635bdac8220828ec1d816268835e6197e08c34fbc4d7cfab492490127f2254b2a77
-
SSDEEP
1536:S8erouSY+A37feaCMJDmYsLIb4PvYqHB/AdGG:buouSDADeak7dJHB/AdGG
Malware Config
Signatures
Files
-
7362c778b8f54434baac9d9a5eb40fb3ffef897ca3a4d5a166c1ec24e5400034.exe windows x86
64ac4087558eb5ac1877c3d62e78707e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetEnvironmentStrings
GetModuleFileNameA
SetHandleCount
GetEnvironmentStringsW
LoadLibraryA
GetProcAddress
HeapReAlloc
VirtualAlloc
HeapAlloc
LCMapStringW
LCMapStringA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
Sleep
GetOEMCP
RtlUnwind
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetCPInfo
GetACP
user32
MessageBoxA
GetTopWindow
GetWindowThreadProcessId
GetWindowTextA
GetWindow
FindWindowA
SendMessageA
insert
SetHook
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE