?_GetCaretBlinkTime@@YGPAX_KDI@Z
Static task
static1
Behavioral task
behavioral1
Sample
8657cfbf537685fe63240c26011f17c30393ce9a602414a4f100e4c538b214dd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8657cfbf537685fe63240c26011f17c30393ce9a602414a4f100e4c538b214dd.exe
Resource
win10v2004-20220812-en
General
-
Target
8657cfbf537685fe63240c26011f17c30393ce9a602414a4f100e4c538b214dd
-
Size
88KB
-
MD5
52085b6a4d76443562a45556bae8c291
-
SHA1
c0516919e9cf48983989d67105a9670ac8b9d6ee
-
SHA256
8657cfbf537685fe63240c26011f17c30393ce9a602414a4f100e4c538b214dd
-
SHA512
114aed3e131647c2995c5182317aa3289ae86099c81fd59e88919818dd55521101bf4c6c676fe224def55c4afaabffee6b0704d751cc7a348b3080d45d051ae0
-
SSDEEP
1536:xrcCnf2bLzaNmUT31Pu20lSL/LwowFhHo13Z8Cx7LwgDkPoYzuGoQI:eeykmS0lQLw9hItZB1wgDkP1o7
Malware Config
Signatures
Files
-
8657cfbf537685fe63240c26011f17c30393ce9a602414a4f100e4c538b214dd.exe windows x86
e20bb4b67e207a536d73cb11bccbbf74
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrCmpNIA
PathCanonicalizeA
StrRChrA
ord158
ChrCmpIW
PathFindFileNameW
shell32
SHCreateQueryCancelAutoPlayMoniker
kernel32
CreateMailslotA
GetCommConfig
CopyFileA
CreateFileMappingA
FileTimeToDosDateTime
OpenJobObjectA
GetDllDirectoryW
GlobalFlags
lstrcatW
GetHandleInformation
CreateTapePartition
TransmitCommChar
GetCommMask
OpenFileMappingW
lstrcpyA
CreateWaitableTimerW
OpenEventA
LoadLibraryExW
FlushFileBuffers
user32
SetScrollRange
EnumDisplaySettingsA
CallNextHookEx
AttachThreadInput
ChangeMenuA
DefDlgProcW
OpenDesktopA
GetDoubleClickTime
GetMonitorInfoA
SetPropW
GetKeyboardLayoutNameW
SetWindowContextHelpId
GetMenuStringA
CreatePopupMenu
IsDlgButtonChecked
SetCaretPos
SetWindowTextW
SendMessageCallbackA
LoadBitmapA
DestroyIcon
gdi32
ExtSelectClipRgn
Polyline
GetEnhMetaFilePaletteEntries
GetPath
CreateDiscardableBitmap
FixBrushOrgEx
SetTextJustification
GetTextAlign
GetPaletteEntries
CreateMetaFileA
GetCurrentObject
CreateEnhMetaFileW
Exports
Exports
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.icode Size: 1024B - Virtual size: 640B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.m_data Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MData Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.c_data Size: 512B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.n_data Size: 1024B - Virtual size: 652B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 860B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ