Static task
static1
Behavioral task
behavioral1
Sample
0475c23e53589506dff46f141811396e0f11b5c23c7ab61f1869c446b0d4204d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0475c23e53589506dff46f141811396e0f11b5c23c7ab61f1869c446b0d4204d.exe
Resource
win10v2004-20220812-en
General
-
Target
0475c23e53589506dff46f141811396e0f11b5c23c7ab61f1869c446b0d4204d
-
Size
97KB
-
MD5
042bbb37873afd00396fcd2d23b7d812
-
SHA1
700503026bbd78ded4d00e4358f69d910c511851
-
SHA256
0475c23e53589506dff46f141811396e0f11b5c23c7ab61f1869c446b0d4204d
-
SHA512
ea67bc75e170952eee65e089d748a98cb3787bc79123564d4b85fcdfe6aba8579be6ff377cd9c7ef119a83d9c437307c8479a24515e1aa5597868ec8180c5664
-
SSDEEP
1536:2pXfGxKjqArOgFm7BYUfng9fMGQkINB1Eq:KXO2qwWZnkfIkIWq
Malware Config
Signatures
Files
-
0475c23e53589506dff46f141811396e0f11b5c23c7ab61f1869c446b0d4204d.exe windows x86
c01572d51fa86de194366162e0b61dbd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceW
EnumSystemLocalesA
GetProcAddress
DeleteCriticalSection
GetCommandLineW
IsValidLocale
GetModuleFileNameA
VirtualAlloc
LoadLibraryA
GetTimeZoneInformation
GetVersionExW
WaitForSingleObject
LocalFree
user32
PostMessageW
GetKeyState
GetScrollPos
CallWindowProcW
mouse_event
CreateWindowExW
DispatchMessageA
GetMessageA
GetClientRect
GetDlgItemInt
UpdateWindow
TranslateMessage
GetMenuItemID
GetDlgItem
DeferWindowPos
DestroyAcceleratorTable
EnableMenuItem
TrackPopupMenu
gdi32
GetStockObject
CreatePatternBrush
PatBlt
OffsetWindowOrgEx
DeleteObject
SelectObject
CreateFontW
SetBkColor
MoveToEx
CreateFontIndirectW
ExtTextOutW
DeleteDC
Rectangle
CreateCompatibleDC
RestoreDC
CreateHatchBrush
comdlg32
ChooseColorW
PrintDlgW
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegQueryValueExW
RegDeleteValueW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
IsTextUnicode
RegOpenKeyExW
RegCreateKeyExW
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
alghqyj Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE