Static task
static1
Behavioral task
behavioral1
Sample
683c4fde2d34d560706bb8bcee722314d56c03c290b4bfb5a2ada59ce09c8ba9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
683c4fde2d34d560706bb8bcee722314d56c03c290b4bfb5a2ada59ce09c8ba9.exe
Resource
win10v2004-20220812-en
General
-
Target
683c4fde2d34d560706bb8bcee722314d56c03c290b4bfb5a2ada59ce09c8ba9
-
Size
65KB
-
MD5
50df0cb318ff2a965ef9c04120ade2b0
-
SHA1
169109da59f49503cdfbc23573ffc3b21cdad2f8
-
SHA256
683c4fde2d34d560706bb8bcee722314d56c03c290b4bfb5a2ada59ce09c8ba9
-
SHA512
77f5a4ad8ee3e72fe98c3ebdd2230c88398b2eca76884a7b909c270f1cc3323af5fcbc093ca5dd2cf54d3a64a5dc93ed1d78e070cb859e067ec080f0c0b303d9
-
SSDEEP
768:lAQExAj498OPNNYScPDahXlfGynmwghM6Gp2bPvlKeasJtFR6OhX:lAQ2Ak9TlCjmh1fGqma6GpoKpCf6OhX
Malware Config
Signatures
Files
-
683c4fde2d34d560706bb8bcee722314d56c03c290b4bfb5a2ada59ce09c8ba9.exe windows x86
040816f3926328a8a5c98d0bef8dd7ae
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalAlloc
VirtualAllocEx
IsBadCodePtr
CreateEventW
OpenWaitableTimerW
lstrcmpiA
RemoveDirectoryW
BeginUpdateResourceA
GetModuleHandleW
IsValidLocale
GetSystemDefaultLangID
AddAtomA
CreateMailslotA
BeginUpdateResourceW
OpenMutexA
lstrlenW
RemoveDirectoryA
GetFullPathNameA
MoveFileA
ExpandEnvironmentStringsW
GetFullPathNameW
OpenEventW
GetTempFileNameW
GetAtomNameW
GetTimeFormatA
FindResourceW
GetLongPathNameA
FindResourceA
WinExec
SetErrorMode
GetUserDefaultLangID
Beep
IsBadStringPtrA
GetACP
CreatePipe
DosDateTimeToFileTime
GetDateFormatA
GetVolumeInformationA
SystemTimeToFileTime
GetModuleHandleA
SetLocaleInfoA
CreateSemaphoreW
GetCalendarInfoW
DisconnectNamedPipe
WaitForSingleObject
lstrcmpA
FreeLibrary
GetSystemDirectoryA
GetDiskFreeSpaceW
GlobalGetAtomNameA
GetExpandedNameA
FindAtomW
DuplicateHandle
ExpandEnvironmentStringsA
EnumDateFormatsW
SetComputerNameA
GetLongPathNameW
GetVolumeInformationW
GetOEMCP
lstrcpyA
SetComputerNameW
GetProcessHeaps
SetLocaleInfoW
EnumTimeFormatsA
ReplaceFileA
CreateSemaphoreA
GetShortPathNameW
QueryPerformanceFrequency
lstrcpy
ConnectNamedPipe
GetTempFileNameA
GetNumberFormatW
lstrlen
MoveFileW
GetCurrentThreadId
GetDiskFreeSpaceA
user32
CreateWindowExW
SetWindowPos
SendDlgItemMessageW
CreateAcceleratorTableW
MessageBeep
MonitorFromWindow
GetMenuInfo
RemoveMenu
GetMenuState
RegisterClassExW
CheckMenuItem
GetCapture
GetCursorPos
IsMenu
SetCursor
CharPrevA
TrackPopupMenuEx
SetWindowTextW
RegisterWindowMessageA
DialogBoxParamA
EnumWindows
SetParent
GetDlgItemTextA
SetTimer
LoadCursorW
mouse_event
GetClassInfoW
GetMenuItemRect
SetWindowRgn
GetMenuItemInfoW
MessageBoxIndirectW
CreatePopupMenu
GetClassInfoExA
GetMenuItemInfoA
EnableWindow
GetDlgItemTextW
GetSystemMetrics
RegisterClassW
LoadBitmapA
LoadMenuIndirectW
MessageBoxW
PostMessageW
CreateDialogParamA
CreateDialogIndirectParamW
CharLowerW
OffsetRect
LoadCursorA
LoadBitmapW
CharUpperW
GetTopWindow
InsertMenuItemW
ShowCaret
GetMenuStringA
GetDlgItemInt
PeekMessageW
DialogBoxParamW
WinHelpA
OpenClipboard
PostQuitMessage
LoadIconA
CharNextW
FindWindowA
GetMenuItemID
SetActiveWindow
PostMessageA
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 38KB - Virtual size: 13.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ