Static task
static1
Behavioral task
behavioral1
Sample
99256ecff24d0d7dbcdc1bbe6c3857274c2543460c2779ed140b67b4ac8265b0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
99256ecff24d0d7dbcdc1bbe6c3857274c2543460c2779ed140b67b4ac8265b0.exe
Resource
win10v2004-20220812-en
General
-
Target
99256ecff24d0d7dbcdc1bbe6c3857274c2543460c2779ed140b67b4ac8265b0
-
Size
52KB
-
MD5
a113710a912d0b4b9f4477dd8227f9b0
-
SHA1
3d011f42fc48f6dbd33828d65394d8e245edd244
-
SHA256
99256ecff24d0d7dbcdc1bbe6c3857274c2543460c2779ed140b67b4ac8265b0
-
SHA512
0043d0ee0c4b606dc6e1afc37ce2eab9e15c2924c2fb671474e31b429f6473439dd92f590a233c7447b79ddb4a172d4aaaffb894fc697dbc544a4c8745229855
-
SSDEEP
768:zY9zdE8novfTzag3s9AoKOtq9hct6PHP8WVmR:09BEgof9IAoKiq9hctCHP8W8
Malware Config
Signatures
Files
-
99256ecff24d0d7dbcdc1bbe6c3857274c2543460c2779ed140b67b4ac8265b0.exe windows x86
82cedb12d90ebc9b82cb1b1846446517
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
RegisterClassExW
LoadCursorW
LoadIconW
GetMessageW
TranslateMessage
DispatchMessageW
DefWindowProcW
SendMessageW
DestroyWindow
DialogBoxParamW
BeginPaint
DrawTextW
EndPaint
PostQuitMessage
SetFocus
EndDialog
CreateWindowExW
kernel32
GetTickCount
LoadLibraryA
CreateFileA
GetSystemDirectoryW
CloseHandle
CreateFileW
LoadLibraryW
GetStartupInfoA
ReadFile
GetModuleHandleA
GetCommandLineW
gdi32
CreateSolidBrush
DeleteObject
GetStockObject
SetTextAlign
comctl32
InitCommonControlsEx
shell32
CommandLineToArgvW
DragFinish
ExtractIconA
crtdll
_local_unwind2
_global_unwind2
_fmode_dll
_commode_dll
??2@YAPAXI@Z
_initterm
_acmdln_dll
exit
_XcptFilter
_exit
__GetMainArgs
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ