Static task
static1
Behavioral task
behavioral1
Sample
14083fa6461b304737d1d9941967ab6e549076903a2ed4bdc2a9f6b1e96ab47b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
14083fa6461b304737d1d9941967ab6e549076903a2ed4bdc2a9f6b1e96ab47b.exe
Resource
win10v2004-20220901-en
General
-
Target
14083fa6461b304737d1d9941967ab6e549076903a2ed4bdc2a9f6b1e96ab47b
-
Size
103KB
-
MD5
611d783809d4bd30afb37e01e43903f6
-
SHA1
d987e277cc8a769ef189ba77fd736e55d5fcc5a5
-
SHA256
14083fa6461b304737d1d9941967ab6e549076903a2ed4bdc2a9f6b1e96ab47b
-
SHA512
9a8ca19a95a9c6c3046d2039c9bbb94d5660b40f6a3f94c7d65383550ca4ccb370d059c8fa6b5b164bd5d87b7411528b42d71ac5e06a8ddc57cf7c447a238fd9
-
SSDEEP
3072:VaQo03tPdZeVXq8xNR6tgR07WtU/Wbf8:B0BXR0SUS8
Malware Config
Signatures
Files
-
14083fa6461b304737d1d9941967ab6e549076903a2ed4bdc2a9f6b1e96ab47b.exe windows x86
7d1e4fd2323ccd3397e6069b63cc0f2d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ExtractIconExA
SHGetSpecialFolderPathW
ShellExecuteExA
user32
GetDesktopWindow
SetWindowPos
EndDialog
FillRect
IsWindowVisible
GetDlgItemTextA
CharPrevA
GetParent
SystemParametersInfoA
EnableWindow
DestroyWindow
RegisterClassA
DrawTextA
CharNextA
PostQuitMessage
LoadBitmapA
GetWindowTextA
CreateDialogParamA
SetDlgItemTextA
SendDlgItemMessageA
GetDlgItem
GetClientRect
SetRect
GetWindowRect
LoadIconA
LoadCursorA
EndPaint
SetClassLongA
ScreenToClient
BeginPaint
urlmon
CreateURLMoniker
kernel32
WaitForSingleObject
GetProcessHeap
GetLocaleInfoA
IsValidCodePage
HeapAlloc
FindVolumeClose
FileTimeToLocalFileTime
FindFirstFileA
lstrcpynA
FindClose
VirtualFree
LCMapStringW
GetConsoleScreenBufferInfo
InitializeCriticalSection
GetStdHandle
SetEnvironmentVariableA
GetDriveTypeA
HeapFree
GetVolumeInformationA
GetShortPathNameA
LocalUnlock
CompareStringA
GetFileAttributesA
GetCurrentProcess
GetLocaleInfoW
GetDriveTypeA
GetVersionExA
GetConsoleMode
GetEnvironmentVariableA
GetModuleHandleA
LoadLibraryA
SetStdHandle
lstrcmpiA
SetConsoleMode
SetVolumeLabelA
GetStringTypeA
GetUserDefaultUILanguage
GetSystemTime
LCMapStringA
GetStringTypeW
LeaveCriticalSection
GetTimeZoneInformation
GetStartupInfoA
ReleaseMutex
GetFileTime
FileTimeToSystemTime
CreateMutexA
GetModuleFileNameA
GetModuleHandleExW
SetThreadPriorityBoost
GetUserDefaultLCID
HeapDestroy
VirtualAlloc
InterlockedExchange
GetFileType
SetHandleCount
CreateFileA
CompareStringW
FindNextFileA
IsValidLocale
GetFullPathNameA
HeapCreate
GetLocalTime
LocalLock
GetProcAddress
Sleep
EnumSystemLocalesA
FlushFileBuffers
WideCharToMultiByte
ExitProcess
lstrlenA
SetConsoleCtrlHandler
gdi32
GetNearestColor
OffsetClipRgn
CreateRectRgn
GetStockObject
GetClipRgn
SetBkColor
CreatePen
IntersectClipRect
SetTextColor
SelectObject
ole32
OleUninitialize
CoCreateInstance
OleInitialize
shlwapi
PathRemoveBackslashA
PathFileExistsW
SHDeleteValueA
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 87KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pqygtdg Size: - Virtual size: 6KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE