Static task
static1
Behavioral task
behavioral1
Sample
39aa8781f2dfbf7810408536d3d6b4d7343894e2a83baa3e4e5a32f0fcdd51fd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
39aa8781f2dfbf7810408536d3d6b4d7343894e2a83baa3e4e5a32f0fcdd51fd.exe
Resource
win10v2004-20220901-en
General
-
Target
39aa8781f2dfbf7810408536d3d6b4d7343894e2a83baa3e4e5a32f0fcdd51fd
-
Size
153KB
-
MD5
68c5fd394f71e24ed7c992d5f155fb65
-
SHA1
869b75ce8f87e6c78da48314a4f55ceb828d360d
-
SHA256
39aa8781f2dfbf7810408536d3d6b4d7343894e2a83baa3e4e5a32f0fcdd51fd
-
SHA512
6fd1d681e142d7080491c79e14fbb339e3ae3e84d0a59b445a3fa62584ddb99154f804ab713f9fbe6e9e6bc734a7c345372e04bfef8a392cc0b88f7540bd19fb
-
SSDEEP
3072:dZeNJofUXhT6bmzKsB+c1pzJyW9uJTlXIDPHT2G:dcIsBPjuRXsr2
Malware Config
Signatures
Files
-
39aa8781f2dfbf7810408536d3d6b4d7343894e2a83baa3e4e5a32f0fcdd51fd.exe windows x86
fc7b403ff968d67fd61aab9dc82feca2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsSetValue
LocalAlloc
Beep
TlsAlloc
GlobalLock
GlobalAlloc
CloseHandle
GetCurrentDirectoryA
GetCurrencyFormatA
lstrcmpiA
CreateThread
lstrcatA
SetEnvironmentVariableA
GetCurrentThread
GetTempFileNameA
GetTempPathA
GlobalMemoryStatus
GetProcAddress
LoadLibraryA
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
GetOEMCP
GetACP
GetCPInfo
GetExitCodeThread
ExitThread
TlsGetValue
SetCurrentDirectoryA
LocalFree
HeapReAlloc
VirtualAlloc
RaiseException
WriteFile
RtlUnwind
VirtualFree
HeapCreate
GetSystemTimeAsFileTime
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapAlloc
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
user32
MessageBoxA
EndDialog
FindWindowA
EnableScrollBar
SetLastErrorEx
SetClipboardData
GetDlgItemTextA
gdi32
CreatePen
DeleteObject
CreateFontIndirectA
CreateRectRgn
comdlg32
FindTextA
shell32
ShellExecuteA
msvcrt
_itoa
shlwapi
PathIsDirectoryA
Sections
.text Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 119KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE