Static task
static1
Behavioral task
behavioral1
Sample
862db1d9016850922543bd663647720428ed0cc6342df851a493b8da65df5fad.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
862db1d9016850922543bd663647720428ed0cc6342df851a493b8da65df5fad.exe
Resource
win10v2004-20220812-en
General
-
Target
862db1d9016850922543bd663647720428ed0cc6342df851a493b8da65df5fad
-
Size
281KB
-
MD5
68c6f234b545758187f10a8cba5eaf20
-
SHA1
2600d825706763ef596472cce1d5cdf2ad5c2b26
-
SHA256
862db1d9016850922543bd663647720428ed0cc6342df851a493b8da65df5fad
-
SHA512
e0494d0cedd8345d4aabceb34fc40fb5ad8f3434ec18fff63a63ac84300de452339224842cd3c972c2ee5d548897eadc1ed7ce68a22b3b973354593147fe432e
-
SSDEEP
6144:KsXeMUkYZkDX+ii/JvvD3b+e3tWnOahz7ms48BhvCZ:pOzksk74Bv7rdOFM84
Malware Config
Signatures
Files
-
862db1d9016850922543bd663647720428ed0cc6342df851a493b8da65df5fad.exe windows x86
3ee5246d7cbc661af1605bd3be59623b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
VarUI1FromBool
VarCyRound
VarMonthName
VarCyFromI1
VarBoolFromI1
DispInvoke
VarDecFromDate
SafeArrayDestroyDescriptor
VarDateFromR4
VarCyFromI2
VarUI1FromStr
VarDecCmpR8
VarBstrFromI4
VarBoolFromR4
SafeArrayCopy
VarI2FromR4
VarI1FromCy
LPSAFEARRAY_UserFree
GetActiveObject
VarI4FromDate
user32
DrawIconEx
DlgDirSelectComboBoxExW
GetPriorityClipboardFormat
GetUserObjectInformationA
CheckRadioButton
GetWindowModuleFileNameW
SetDoubleClickTime
DdeSetQualityOfService
OpenWindowStationW
PeekMessageW
OpenInputDesktop
FlashWindow
DestroyWindow
GrayStringW
MsgWaitForMultipleObjects
msvcrt
_initterm
__setusermatherr
_adjust_fdiv
__p__fmode
__set_app_type
__getmainargs
_exit
_XcptFilter
exit
_except_handler3
__p__commode
_controlfp
__dllonexit
_onexit
_acmdln
ole32
OleCreateLinkToFile
HBITMAP_UserUnmarshal
CLIPFORMAT_UserMarshal
CoFileTimeNow
ReadFmtUserTypeStg
OleCreateLinkFromData
OleCreateFromData
STGMEDIUM_UserUnmarshal
GetConvertStg
CreateDataCache
CoLockObjectExternal
HWND_UserFree
CoTaskMemFree
HBITMAP_UserFree
gdi32
CopyMetaFileW
Pie
CreateICA
OffsetWindowOrgEx
CreateEllipticRgn
ExtCreateRegion
GetCharWidthFloatW
SaveDC
DeleteEnhMetaFile
TextOutW
GetTextCharsetInfo
kernel32
ExitProcess
GetModuleHandleA
GetStartupInfoA
shell32
SHBrowseForFolderA
SHQueryRecycleBinW
ShellExecuteA
ShellExecuteExA
Shell_NotifyIconA
SHGetSpecialFolderPathA
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ