Static task
static1
Behavioral task
behavioral1
Sample
647ffb878a8436c13e4f9026ab04e20004c7b375dd5aeb66f488c55ab8a8f76c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
647ffb878a8436c13e4f9026ab04e20004c7b375dd5aeb66f488c55ab8a8f76c.exe
Resource
win10v2004-20220812-en
General
-
Target
647ffb878a8436c13e4f9026ab04e20004c7b375dd5aeb66f488c55ab8a8f76c
-
Size
576KB
-
MD5
6b954c1026f9c3ef70aaf07cbd569430
-
SHA1
e23cf861acc76c9ba181bea5d892d015bd4b88ab
-
SHA256
647ffb878a8436c13e4f9026ab04e20004c7b375dd5aeb66f488c55ab8a8f76c
-
SHA512
cc918646a7c8a26bc09fade54235217576a1a66c9d69bb4f5374155bcd3dd67888421d0e11fa035a975a92019b0f38403d0ff424c1b3a00372dba981c7c9db8f
-
SSDEEP
12288:mkfH7fXuIkXJn4JbgH+Wz+ybUyztc0OjtRAPrMpVeU:mkf7febgJWz5XW9RAIpUU
Malware Config
Signatures
Files
-
647ffb878a8436c13e4f9026ab04e20004c7b375dd5aeb66f488c55ab8a8f76c.exe windows x86
9aa92a8554f340c86d43b324b1838ba3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CreateFontA
CreatePen
CreateSolidBrush
DeleteObject
Ellipse
FloodFill
GetStockObject
LineTo
MoveToEx
Pie
SelectObject
SetBkMode
SetTextCharacterExtra
SetTextColor
TextOutA
user32
BeginPaint
CharUpperBuffA
CreateWindowExA
DefWindowProcA
DestroyWindow
DispatchMessageA
DrawTextA
EndPaint
GetCursorPos
GetSystemMetrics
IntersectRect
InvalidateRect
KillTimer
LoadCursorA
LoadIconA
MessageBoxA
PeekMessageA
PostMessageA
PostQuitMessage
RegisterClassA
SetCursorPos
SetFocus
SetTimer
SetWindowsHookExA
ShowCursor
ShowWindow
TranslateMessage
UnhookWindowsHookEx
UpdateWindow
ValidateRect
kernel32
CloseHandle
CreateEventA
CreateFileA
CreateThread
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
ExitProcess
ExitThread
FlushFileBuffers
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleMode
GetCurrentDirectoryA
GetCurrentProcessId
GetCurrentThreadId
GetCurrentThread
GetDriveTypeA
GetEnvironmentStrings
GetFileAttributesA
GetFileSize
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetOEMCP
GetProcAddress
GetStdHandle
GetTickCount
GetVersion
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
MoveFileA
MultiByteToWideChar
ReadConsoleInputA
ReadFile
SetConsoleCtrlHandler
SetConsoleMode
SetEnvironmentVariableA
SetEnvironmentVariableW
SetEvent
SetFilePointer
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteConsoleA
WriteFile
winmm
auxGetDevCapsA
auxGetNumDevs
auxGetVolume
auxSetVolume
mciGetDeviceIDA
mciSendStringA
midiOutGetVolume
midiOutSetVolume
timeGetTime
timeKillEvent
timeSetEvent
dsound
DirectSoundCreate
ddraw
DirectDrawCreate
Sections
AUTO Size: 377KB - Virtual size:
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DGROUP Size: 151KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 62KB - Virtual size:
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 40KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ