?toggleMin@@YGKPA_K@Z
Static task
static1
Behavioral task
behavioral1
Sample
b1843e4520a4ae40c317add8d224c54a4b892c2bdcbe8da08014839ae8fff481.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b1843e4520a4ae40c317add8d224c54a4b892c2bdcbe8da08014839ae8fff481.exe
Resource
win10v2004-20220901-en
General
-
Target
b1843e4520a4ae40c317add8d224c54a4b892c2bdcbe8da08014839ae8fff481
-
Size
304KB
-
MD5
a11fa8ec99f244fb699bc4879e8a5820
-
SHA1
62d4dd621110ed63bd41d28d8d4e0cc6123c85ad
-
SHA256
b1843e4520a4ae40c317add8d224c54a4b892c2bdcbe8da08014839ae8fff481
-
SHA512
7e7220e5c5d54d56101eba8f6ca0010c9bdc85e63e8a0b5e8178565ccd1fa393e1482999dbec257f81ec7f132e7680875114d3ece42175cedb3e038b8984f408
-
SSDEEP
6144:l5iTfMGdWXysZb+ZtX8YtYEumFEglCpB0Xgwv7j8hC4y07kNyijel60RB4HvdI:l5QdWXyu6ZtXLYEIgl8BI3UlJXiKc0RP
Malware Config
Signatures
Files
-
b1843e4520a4ae40c317add8d224c54a4b892c2bdcbe8da08014839ae8fff481.exe windows x86
4f188e189e58ee9348aa8cd1a334f1f0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHQueryRecycleBinW
ord24
SHFormatDrive
ord47
SHGetDataFromIDListA
shlwapi
ord29
kernel32
GetTempPathA
ScrollConsoleScreenBufferA
WaitForDebugEvent
CreateFileMappingW
LocalAlloc
CopyFileA
GetVolumeInformationW
GlobalCompact
FlushConsoleInputBuffer
OutputDebugStringW
GetCompressedFileSizeW
HeapCreate
CreateSemaphoreA
GetBinaryTypeA
IsBadWritePtr
GetStartupInfoW
LCMapStringA
GetThreadLocale
MoveFileW
lstrcpyW
user32
GetWindow
ActivateKeyboardLayout
OpenClipboard
FlashWindow
PeekMessageW
GetClassInfoExW
EnumWindows
FindWindowExA
OpenDesktopW
CharPrevW
wvsprintfW
InsertMenuItemA
InternalGetWindowText
CreateDesktopW
UnloadKeyboardLayout
Exports
Exports
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 87B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 218KB - Virtual size: 218KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 1021B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE