_q_rdSb0hKrkQ
Static task
static1
Behavioral task
behavioral1
Sample
779a094b1ea6b350fb53048dddb02fa300a5c222a2ee6f19352cc22b6dc27cbd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
779a094b1ea6b350fb53048dddb02fa300a5c222a2ee6f19352cc22b6dc27cbd.exe
Resource
win10v2004-20220901-en
General
-
Target
779a094b1ea6b350fb53048dddb02fa300a5c222a2ee6f19352cc22b6dc27cbd
-
Size
155KB
-
MD5
1c6f5880386d47e3d4c5f42a1d0b4929
-
SHA1
239e1c63352e96991e2afc99487ac6179e30ef16
-
SHA256
779a094b1ea6b350fb53048dddb02fa300a5c222a2ee6f19352cc22b6dc27cbd
-
SHA512
b58a0566f8fe75a71211dbc8ba0be861a767ad32945a9b78590bd52b4379df90f2f0480e44f86665ce4494668c91ff5f97a153d3ff349f209b5cf8d5de9f007b
-
SSDEEP
3072:A8Z0kjN98g6D+zkt2Fh0MWMSeuonFMthBjP3X4aX:APkJ9d+1wVF6hR
Malware Config
Signatures
Files
-
779a094b1ea6b350fb53048dddb02fa300a5c222a2ee6f19352cc22b6dc27cbd.exe windows x86
efb42b207340321e508a474c90bcf4ad
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
SHQueryInfoKeyA
SHDeleteValueA
user32
GetKeyboardLayoutNameA
UnregisterClassA
GetParent
SendMessageW
LoadIconA
GetForegroundWindow
GetScrollRange
PeekMessageW
OpenIcon
EndPaint
GetDesktopWindow
WaitMessage
RemoveMenu
IsMenu
CallWindowProcA
GetCapture
ChildWindowFromPoint
RemovePropA
GetKeyNameTextA
IsWindowVisible
SetWindowLongA
SetMenu
GetClientRect
GetFocus
SetWindowTextA
InsertMenuA
IsCharUpperA
MapVirtualKeyA
SetCursor
GetMenu
SetWindowsHookExA
IsWindow
DestroyCursor
SetClipboardData
OpenClipboard
DestroyMenu
BeginPaint
DefMDIChildProcA
TranslateMDISysAccel
PostQuitMessage
ShowScrollBar
UpdateWindow
GetCursorPos
ScrollWindow
MapWindowPoints
SetCapture
EnableMenuItem
DefFrameProcA
EnableWindow
FrameRect
GetWindowPlacement
MessageBeep
IsWindowEnabled
SystemParametersInfoA
GetDC
GetMenuState
EnumThreadWindows
SetScrollRange
LoadBitmapA
CharNextA
IntersectRect
kernel32
GetLocaleInfoA
GetProcAddress
GetStdHandle
WideCharToMultiByte
ExitProcess
CreateFileA
DeleteCriticalSection
lstrcmpiA
lstrcmpA
GetOEMCP
lstrcpyA
MoveFileA
VirtualQuery
LoadLibraryA
lstrlenA
GetProcessHeap
CompareStringA
GetStartupInfoA
MoveFileExA
HeapDestroy
GetLocalTime
VirtualAlloc
VirtualAllocEx
GetCommandLineW
gdi32
SetTextColor
CreateDIBSection
GetCurrentPositionEx
GetBkMode
Exports
Exports
Sections
.text Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fadata Size: 512B - Virtual size: 76B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ