Static task
static1
Behavioral task
behavioral1
Sample
b5c2340cf26082433b0472b3b9ab2436482308d8c256839571117ce32520a0be.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b5c2340cf26082433b0472b3b9ab2436482308d8c256839571117ce32520a0be.exe
Resource
win10v2004-20220812-en
General
-
Target
b5c2340cf26082433b0472b3b9ab2436482308d8c256839571117ce32520a0be
-
Size
221KB
-
MD5
810fe0d5cd34dd9e315af493d51da18e
-
SHA1
85f3a9386a10a380e94ad240de37514b6ed94bf3
-
SHA256
b5c2340cf26082433b0472b3b9ab2436482308d8c256839571117ce32520a0be
-
SHA512
c282def4bd5eee3c72cbcc37f07dd9ac7550f497ab84250715b47fa90a4aae6a4f8d25ccbcd6e2177c0998d601d86a3c5d93705b8c312a0fa491e96cb97e1109
-
SSDEEP
6144:NtSzDVZ9mKejIZ2vICqOK1RurBMwZSJ3Y/LqDgyKkiuPYBM5fDAUrl:Ngl+Ke0xBPAnq7KKsMVVrl
Malware Config
Signatures
Files
-
b5c2340cf26082433b0472b3b9ab2436482308d8c256839571117ce32520a0be.exe windows x86
10ec2e2888449106b79c058347dff8bc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
IsCharAlphaW
EnumChildWindows
MoveWindow
SetWindowTextA
IsCharLowerA
GetDesktopWindow
DialogBoxParamA
SetWindowLongW
GetActiveWindow
ole32
CoRevokeClassObject
CoEnableCallCancellation
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
kernel32
GetStartupInfoA
GetTickCount
HeapDestroy
HeapFree
SizeofResource
SetFileAttributesA
GetTimeZoneInformation
LocalAlloc
SuspendThread
LoadResource
FindResourceExA
GetDateFormatA
LoadLibraryA
FreeLibrary
GetProcAddress
DeleteCriticalSection
InitializeCriticalSection
LocalFree
IsBadStringPtrW
HeapCreate
Sections
.text Size: 163KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ