Static task
static1
Behavioral task
behavioral1
Sample
37c9123d07aaf87fff3b7659037493f7385ccadf7742d3f2b08762af5798b9fc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
37c9123d07aaf87fff3b7659037493f7385ccadf7742d3f2b08762af5798b9fc.exe
Resource
win10v2004-20220812-en
General
-
Target
37c9123d07aaf87fff3b7659037493f7385ccadf7742d3f2b08762af5798b9fc
-
Size
83KB
-
MD5
6bf330d4ca52df94c9fa8ce1283798c0
-
SHA1
e96a1a234b7ed461d03d444c4220b0145e3c384d
-
SHA256
37c9123d07aaf87fff3b7659037493f7385ccadf7742d3f2b08762af5798b9fc
-
SHA512
54880155f99de40fb47c890753c9095724401cfb905ea515051dfd6ca7a56d08781353e47449312b104c5a0b7462c2fefbfcfa6be06ee33af7793e6dc5acab9b
-
SSDEEP
1536:KjdNI9wVB1kScaKEjB/J6UUUUUUUQ3zBs+C9kGk2hIC4N7thjlKFJ+0NCc:WbIuVB1k65JwB9OkGZhIh7thZKFc0Nt
Malware Config
Signatures
Files
-
37c9123d07aaf87fff3b7659037493f7385ccadf7742d3f2b08762af5798b9fc.exe windows x86
0e28c24ce276d5aaaf118a1df9e9d1a3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
CreateMutexA
SetVolumeMountPointA
UnmapViewOfFile
HeapDestroy
GetLastError
GetModuleHandleA
HeapCreate
ExitProcess
FindClose
IsBadCodePtr
FreeEnvironmentStringsA
LocalUnlock
CreateFileA
FreeConsole
GetACP
LoadLibraryExA
TlsGetValue
LocalFree
FindResourceA
user32
FillRect
DrawMenuBar
GetIconInfo
DrawEdge
CallWindowProcA
GetDC
CheckRadioButton
GetDlgItem
IsWindow
DispatchMessageA
DefWindowProcW
GetFocus
CopyRect
uxtheme
GetThemeRect
DrawThemeIcon
DrawThemeEdge
DrawThemeText
GetThemeSysInt
clbcatq
SetupOpen
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 75KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE