Static task
static1
Behavioral task
behavioral1
Sample
0f45a7f0cc4489be84a45eb7d7daea6da6955ace800d1984afcbadfa9c41a142.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0f45a7f0cc4489be84a45eb7d7daea6da6955ace800d1984afcbadfa9c41a142.exe
Resource
win10v2004-20220812-en
General
-
Target
0f45a7f0cc4489be84a45eb7d7daea6da6955ace800d1984afcbadfa9c41a142
-
Size
224KB
-
MD5
03a6f8e31e7d510a1dc6faeac0ed7356
-
SHA1
06e52fd43348a001904230b9e1ecf1631c331d8e
-
SHA256
0f45a7f0cc4489be84a45eb7d7daea6da6955ace800d1984afcbadfa9c41a142
-
SHA512
42efd6d37dd2ffc8c904861e02af236dee1f42511d57a53668167eb6582ded0b8b2c0311664b09fc94297b6ca485bb3f2a183400d1ceac9f29fab2f8152aba4b
-
SSDEEP
6144:pMM8nA0dyctYrT7/PsW8EZd40seWs9ZxipQ:H8nlbtYLPsfEHlWs9apQ
Malware Config
Signatures
Files
-
0f45a7f0cc4489be84a45eb7d7daea6da6955ace800d1984afcbadfa9c41a142.exe windows x86
6528ff49b29691f162bd41cb206544ac
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteA
FindExecutableA
user32
DefWindowProcA
BeginPaint
GetSysColor
GetClientRect
SetRect
EndPaint
SetWindowWord
GetWindowWord
RegisterClassA
OemToCharA
OemToCharBuffA
LoadCursorA
DestroyWindow
SetWindowTextA
SendMessageA
EnableWindow
PostMessageA
GetLastActivePopup
ShowWindow
SetTimer
KillTimer
DialogBoxIndirectParamA
GetWindowRect
GetSystemMetrics
EndDialog
GetKeyState
PeekMessageA
TranslateMessage
DispatchMessageA
GetParent
SetDlgItemTextA
SendDlgItemMessageA
GetDlgItem
InvalidateRect
UpdateWindow
wsprintfA
MessageBoxA
SetCursor
SetWindowPos
GetDlgItemTextA
kernel32
CreateDirectoryA
GetVolumeInformationA
_lwrite
SetFileTime
LocalFileTimeToFileTime
RtlUnwind
GetCommandLineA
GetModuleHandleA
ExitProcess
SetErrorMode
GetVersion
LoadLibraryA
GetProcAddress
GetModuleFileNameA
FreeLibrary
lstrcmpiA
GetEnvironmentVariableA
GetWindowsDirectoryA
LocalAlloc
LocalFree
GlobalUnlock
GlobalHandle
GlobalFree
GlobalAlloc
GlobalLock
WinExec
_llseek
GetDriveTypeA
lstrcatA
FindClose
FindFirstFileA
GetCurrentDirectoryA
SetCurrentDirectoryA
lstrlenA
lstrcpyA
_lread
DosDateTimeToFileTime
_lcreat
_lopen
_lclose
gdi32
SetTextColor
SetTextAlign
GetTextExtentPoint32A
GetBkColor
DeleteObject
SetBkColor
ExtTextOutA
CreateDCA
GetDeviceCaps
CreateFontIndirectA
DeleteDC
SelectObject
advapi32
RegQueryValueA
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 146B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.tc Size: 195KB - Virtual size: 196KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE