Static task
static1
Behavioral task
behavioral1
Sample
0da273b3092a81cd75db771573bccc030011325a3fbc23103bf1e8de2dad3707.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0da273b3092a81cd75db771573bccc030011325a3fbc23103bf1e8de2dad3707.exe
Resource
win10v2004-20220812-en
General
-
Target
0da273b3092a81cd75db771573bccc030011325a3fbc23103bf1e8de2dad3707
-
Size
349KB
-
MD5
62e1b71011982aec7520d2cf3c693f00
-
SHA1
9c81dfa9f5b7f91ac62e46d19d754f577d773fb3
-
SHA256
0da273b3092a81cd75db771573bccc030011325a3fbc23103bf1e8de2dad3707
-
SHA512
881f78c1a1c98948225e501cfac85525a7434bdff833683d5b9d74e02167a5b0cab36bf003dbc96b00f8724409674d48b87ad16bfffccf9f4a0766345007998f
-
SSDEEP
6144:jN8TefCIrAahvp5RzEOQauzNAe3o+TEazwhYPL1UmRErtmkVcs+Yq:juTeaSBtRgFau9UhmErtmkGB
Malware Config
Signatures
Files
-
0da273b3092a81cd75db771573bccc030011325a3fbc23103bf1e8de2dad3707.exe windows x86
14f9fb1bfb2ef74619b4de86ec605174
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TryEnterCriticalSection
_lread
ExpandEnvironmentStringsW
GetTempPathW
IsBadStringPtrW
FindNextVolumeW
IsBadReadPtr
GlobalFindAtomA
SetEvent
UnhandledExceptionFilter
LocalHandle
OpenEventW
DisconnectNamedPipe
SetEnvironmentVariableA
IsProcessorFeaturePresent
lstrcmpiA
GetThreadLocale
SystemTimeToFileTime
GetProcessTimes
IsValidLocale
GetStringTypeW
FindResourceA
GetTimeFormatW
SetLocalTime
FindCloseChangeNotification
CreateFileMappingA
SetFilePointer
ExitProcess
ContinueDebugEvent
user32
UpdateLayeredWindow
GetProcessDefaultLayout
ScreenToClient
TranslateMDISysAccel
RealGetWindowClassA
SendMessageTimeoutW
SetKeyboardState
wvsprintfW
GetMenuItemRect
GetDlgItemTextA
IsWindowUnicode
DdeEnableCallback
ScrollDC
TileChildWindows
GetAltTabInfoW
WINNLSGetIMEHotkey
DrawTextExA
CheckRadioButton
DdeQueryNextServer
GetDialogBaseUnits
CreateDesktopW
EnumDesktopWindows
DdePostAdvise
MsgWaitForMultipleObjects
GetMenu
MonitorFromRect
SetMenuDefaultItem
SetProcessDefaultLayout
CharUpperBuffW
GetWindowTextLengthA
SetWindowTextA
DlgDirListA
SetClipboardData
MsgWaitForMultipleObjectsEx
IMPGetIMEA
TranslateMessage
SwitchToThisWindow
GetKBCodePage
DefFrameProcW
RegisterHotKey
ValidateRgn
SetWinEventHook
SetParent
ShowOwnedPopups
OemToCharW
SetWindowsHookA
SetWindowsHookW
DdeFreeDataHandle
GetSysColor
DlgDirListComboBoxW
GetThreadDesktop
EnumClipboardFormats
IsHungAppWindow
OemKeyScan
MapVirtualKeyW
IMPQueryIMEA
DefWindowProcA
DdeGetLastError
CharToOemA
EnumDesktopsW
FindWindowW
CascadeChildWindows
HiliteMenuItem
CharNextExA
ToUnicode
RegisterShellHookWindow
DdeQueryStringA
TrackPopupMenuEx
DlgDirListW
GetPriorityClipboardFormat
DestroyCursor
SetCursor
RegisterDeviceNotificationW
DrawEdge
LoadMenuIndirectW
EnableMenuItem
ExcludeUpdateRgn
CallNextHookEx
DrawTextA
CreatePopupMenu
GetClassNameW
DdeCreateStringHandleW
MessageBoxW
PostMessageW
InvalidateRgn
SetMenuItemBitmaps
LoadBitmapA
AppendMenuW
GetWindowModuleFileNameA
GetMenuInfo
GetParent
RegisterDeviceNotificationA
ModifyMenuA
UnregisterClassA
CopyRect
EnumDisplayMonitors
Sections
.text Size: 172KB - Virtual size: 171KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 166KB - Virtual size: 166KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ