Static task
static1
Behavioral task
behavioral1
Sample
97c39fa6f47002679c6557e12f8e0c175e011ca46fec4005c23b907fd903dd88.exe
Resource
win7-20220812-en
General
-
Target
97c39fa6f47002679c6557e12f8e0c175e011ca46fec4005c23b907fd903dd88
-
Size
888KB
-
MD5
3c4e52fe97537a8584246dff5c20e450
-
SHA1
d36c7a631c3e55dbde0a64db7b2c32506760a9ad
-
SHA256
97c39fa6f47002679c6557e12f8e0c175e011ca46fec4005c23b907fd903dd88
-
SHA512
0db3edcaaf5bf92ebbef88024423b8387112563b790254e27f14edcbd0c7963b29e281977e512aa0d6a2102eb170f8098b9e80b765b47709fcd3fa277d1e118c
-
SSDEEP
12288:WlrHZxG6G6968YGRRfZSpnCo1E3EDFkCL986AkRiI/:Wldb96PG3Q8KFkQ8WYA
Malware Config
Signatures
Files
-
97c39fa6f47002679c6557e12f8e0c175e011ca46fec4005c23b907fd903dd88.exe windows x86
52b3d327a4d32c3e3906d0c458a17c7a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
lstrcpynW
GetFileAttributesW
GetDateFormatA
FindClose
FlushFileBuffers
GetSystemInfo
CopyFileW
EnterCriticalSection
Sleep
SetStdHandle
GetFullPathNameW
GetCurrentProcessId
GetLocaleInfoW
VirtualAlloc
GetCurrentThreadId
CreateFileA
GetProcAddress
GetCurrentDirectoryW
GetCurrentDirectoryA
GetStdHandle
FreeEnvironmentStringsW
GlobalSize
GetDateFormatW
lstrcmpiW
EnumSystemLocalesA
InterlockedIncrement
user32
GetKeyState
DialogBoxIndirectParamW
SendDlgItemMessageW
ShowWindow
LoadBitmapW
IsWindow
SetCursor
DefWindowProcW
MonitorFromWindow
GetMenuState
UnhookWindowsHookEx
GetDlgItem
BeginDeferWindowPos
ScrollWindow
SetScrollRange
gdi32
CreateFontW
CreatePen
DPtoLP
GetPixel
DeleteDC
OffsetWindowOrgEx
StartDocW
MoveToEx
GetStockObject
comdlg32
GetOpenFileNameW
PrintDlgW
GetSaveFileNameW
ChooseColorW
advapi32
RegCloseKey
RegQueryInfoKeyW
RegQueryValueExW
RegEnumKeyExW
RegSetValueExW
IsTextUnicode
RegDeleteKeyW
RegOpenKeyExW
RegDeleteValueW
ole32
OleDuplicateData
OleGetClipboard
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 219KB - Virtual size: 220KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pmxkpwg Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
omwzfnv Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hsjezue Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE