Static task
static1
Behavioral task
behavioral1
Sample
78d9dd756f91d4e0427160d810ec842d239a93a088f89f700a56a867a78aeca4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
78d9dd756f91d4e0427160d810ec842d239a93a088f89f700a56a867a78aeca4.exe
Resource
win10v2004-20220812-en
General
-
Target
78d9dd756f91d4e0427160d810ec842d239a93a088f89f700a56a867a78aeca4
-
Size
476KB
-
MD5
832a26fa0f87ce22bdb484eb91245d3c
-
SHA1
532fcadbd7060562eaa055cfde4c803c4e73c3bb
-
SHA256
78d9dd756f91d4e0427160d810ec842d239a93a088f89f700a56a867a78aeca4
-
SHA512
e0dd5a035b380e0b6633dcbc841e0baf13b81cb0a2727cfcf0eb6fc1947af86931f857208090e2759f486fb3d7cc1eaca39806030aa519ec500aac1266684746
-
SSDEEP
6144:ZWJxND5gWO2RIYs6+7r8qBs2fX61Lmsl/rGvO9BkGqDy6Qi7aLOUX:ZorgWOfxr8qfIKM/sOfQXV+iU
Malware Config
Signatures
Files
-
78d9dd756f91d4e0427160d810ec842d239a93a088f89f700a56a867a78aeca4.exe windows x86
3f7f606aab11187ef9f81ac16f0d532f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GetStdHandle
GetFileAttributesW
IsBadCodePtr
Sleep
SetEvent
MapViewOfFile
SetLastError
CloseHandle
HeapDestroy
HeapCreate
GetACP
GetModuleFileNameA
TlsGetValue
GetEnvironmentVariableA
GetModuleHandleA
DeleteFileW
ReadFile
GetCommandLineW
GetStartupInfoA
user32
CallWindowProcW
GetKeyState
GetWindowInfo
GetWindowLongA
DispatchMessageA
GetSysColor
FindWindowA
DrawTextW
DestroyMenu
IsZoomed
SetFocus
DispatchMessageA
GetClassInfoA
qcliprov
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
inetcpl.cpl
DllInstall
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 384KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 466KB - Virtual size: 465KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ