Static task
static1
Behavioral task
behavioral1
Sample
743c886d10038fc4bbd08e117392729e25c112099ffc198c3c969c6ca475fe39.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
743c886d10038fc4bbd08e117392729e25c112099ffc198c3c969c6ca475fe39.exe
Resource
win10v2004-20220901-en
General
-
Target
743c886d10038fc4bbd08e117392729e25c112099ffc198c3c969c6ca475fe39
-
Size
168KB
-
MD5
90e8c930edb0dccd341dbe71ca50ab68
-
SHA1
56b75291cd22cf5c5a501c4966fa2055cfbc229b
-
SHA256
743c886d10038fc4bbd08e117392729e25c112099ffc198c3c969c6ca475fe39
-
SHA512
d0bd162375250cebd4b25d4dbbf93ae21258e6cf0487b330d727f3b1b3fca09c8843df909a64a8bb3f6758ca2812524102c7df7de74c84715fe21f84e8b15b9f
-
SSDEEP
3072:M2df1Go8ByedbqmSLCf7FWMdoc6onZuY1aGrCp71nKTypjZyxoo1:l1Go8BynjgBHovuZ1aGr5k0
Malware Config
Signatures
Files
-
743c886d10038fc4bbd08e117392729e25c112099ffc198c3c969c6ca475fe39.exe windows x86
6099d08e33cf3d016c588fe49a94589e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetEnvironmentVariableW
GlobalAddAtomW
GetModuleHandleA
GetLocaleInfoA
LoadLibraryA
GetProcAddress
CloseHandle
SetFilePointer
FlushFileBuffers
ReadFile
GetLastError
HeapReAlloc
VirtualAlloc
GetOEMCP
GetACP
GetCPInfo
HeapAlloc
GetStringTypeW
GetStringTypeA
WriteFile
RtlUnwind
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
TerminateProcess
SetStdHandle
user32
UnhookWinEvent
IsCharAlphaW
IsCharUpperW
DdeAddData
SetShellWindow
ChangeDisplaySettingsExW
GetClipboardData
RegisterClassA
DefMDIChildProcA
PostMessageA
VkKeyScanA
SetCapture
DefFrameProcA
CheckMenuItem
LoadMenuIndirectA
DdeDisconnectList
GetKeyNameTextW
WinHelpW
PeekMessageA
SendIMEMessageExA
GetProcessWindowStation
PtInRect
GetDlgItemTextA
oleaut32
SafeArrayCreate
VarDecCmpR8
VariantCopy
VarBoolFromDec
VarDateFromBool
Sections
.text Size: 160KB - Virtual size: 160KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 243KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 464B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ