Static task
static1
Behavioral task
behavioral1
Sample
47bc1ab1061889ff6402fa2c34e024bf3068e7d8030c8881fde8a0eb5e8cd14c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
47bc1ab1061889ff6402fa2c34e024bf3068e7d8030c8881fde8a0eb5e8cd14c.exe
Resource
win10v2004-20220901-en
General
-
Target
47bc1ab1061889ff6402fa2c34e024bf3068e7d8030c8881fde8a0eb5e8cd14c
-
Size
117KB
-
MD5
72a40e9c0a68fd3194f83e0b2539c3c0
-
SHA1
3099e2066d91d4b3eccbfce77034dcd8dbdb0c4f
-
SHA256
47bc1ab1061889ff6402fa2c34e024bf3068e7d8030c8881fde8a0eb5e8cd14c
-
SHA512
15f46f2ae1b0bf23018c32f0ecb3f7e3cd9410e7c074fb15eb51071628a553225c1edcff2a96879fe767a88114436ace063ac436ad9fe74ca0521c84fa8024d5
-
SSDEEP
3072:okcjvcKADeWX8+QNruZjR7htvHUoColVxEFm6Uo:wCVX8+QNritviOx1
Malware Config
Signatures
Files
-
47bc1ab1061889ff6402fa2c34e024bf3068e7d8030c8881fde8a0eb5e8cd14c.exe windows x86
53d3d48f7dd59f6764fbc1d7ed97366e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateWaitableTimerA
EnumResourceNamesW
_hread
lstrcmpiW
DeleteVolumeMountPointW
GetLocaleInfoW
GetTickCount
UnmapViewOfFile
GetCommTimeouts
GetPrivateProfileStructA
DisconnectNamedPipe
GlobalUnWire
GetModuleHandleW
EnumUILanguagesA
SleepEx
FileTimeToLocalFileTime
GetCurrencyFormatW
FoldStringW
CreateFileA
GetFileSize
ReadFileScatter
FindFirstVolumeW
OpenSemaphoreW
EndUpdateResourceA
FreeUserPhysicalPages
CreateDirectoryExA
LocalReAlloc
GetCalendarInfoW
EnumLanguageGroupLocalesA
GlobalCompact
GlobalDeleteAtom
SetDefaultCommConfigA
GlobalAddAtomW
SetFilePointer
OutputDebugStringW
GetComputerNameExW
ResumeThread
GetFileInformationByHandle
GetStringTypeW
QueryInformationJobObject
SearchPathA
GlobalWire
GetLastError
GetPrivateProfileSectionNamesA
CreateFileW
GetSystemDefaultUILanguage
CreateJobObjectA
user32
ReplyMessage
GetCaretPos
GetDlgItem
CreateIconIndirect
GetDlgCtrlID
SetParent
GetListBoxInfo
ScrollWindow
CharUpperW
DefFrameProcW
ToUnicode
DialogBoxIndirectParamW
LookupIconIdFromDirectory
DestroyMenu
DragObject
DialogBoxIndirectParamA
OemToCharA
SetMenuContextHelpId
DdeGetData
GetComboBoxInfo
SetWinEventHook
EnableScrollBar
ShowWindow
FreeDDElParam
IsCharAlphaNumericA
ScreenToClient
InvalidateRgn
ClientToScreen
SetDebugErrorLevel
GetNextDlgGroupItem
GetCursorInfo
GetQueueStatus
DefDlgProcA
GetMenuContextHelpId
DdeQueryStringW
SendInput
CreateAcceleratorTableA
GetCapture
WinHelpW
LookupIconIdFromDirectoryEx
SetUserObjectSecurity
CharPrevW
LoadBitmapW
DlgDirListA
CheckDlgButton
BroadcastSystemMessageA
GetKeyboardLayoutList
TabbedTextOutW
DdeCreateStringHandleW
IsChild
SendDlgItemMessageA
GetLastInputInfo
MapWindowPoints
SetMenuItemInfoA
DrawAnimatedRects
ShowCaret
DdeKeepStringHandle
GetMessagePos
GetKeyboardLayout
SetCapture
CharLowerA
SendMessageCallbackW
GetMenuItemID
DrawIconEx
shell32
DragQueryPoint
Sections
.text Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 37KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE