Static task
static1
Behavioral task
behavioral1
Sample
84022c59d13a7c5c2c3deb16b5be62f1309b86f85092d6d79f17d48ac46d22d3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
84022c59d13a7c5c2c3deb16b5be62f1309b86f85092d6d79f17d48ac46d22d3.exe
Resource
win10v2004-20220812-en
General
-
Target
84022c59d13a7c5c2c3deb16b5be62f1309b86f85092d6d79f17d48ac46d22d3
-
Size
243KB
-
MD5
a08bb03c622c675fbf6396024dcff610
-
SHA1
5ba555602bb97cdee40d89e9af3b6ff360588903
-
SHA256
84022c59d13a7c5c2c3deb16b5be62f1309b86f85092d6d79f17d48ac46d22d3
-
SHA512
8199d970f9bcd8d6cea743cb53ac6e33c91d04de72da0226d94b2df77edc4473bda6829e1623928b3b24a99c97efe0da9efe3b7fe3d4edccc30473af787aed59
-
SSDEEP
6144:9GQiyr8iCUMGL3agx3FF/Z8NlsGXv5b60rJp8AdWIRce:9GQnTJMOqgJj+sGXvDr8AdF9
Malware Config
Signatures
Files
-
84022c59d13a7c5c2c3deb16b5be62f1309b86f85092d6d79f17d48ac46d22d3.exe windows x86
e42c30f0a08750ecf9794f18da0bdd86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetNumberFormatA
GetConsoleAliasA
GetModuleHandleA
ReadFile
TlsGetValue
HeapCreate
LocalFree
EnterCriticalSection
ResumeThread
CreateEventW
SetLastError
lstrlenW
EnumCalendarInfoA
GetPrivateProfileStringA
GetCurrentProcessId
FindClose
LocalFlags
GetDriveTypeW
GetCurrentThreadId
FindAtomA
user32
GetKeyState
GetClientRect
SetFocus
GetKeyboardType
IsWindow
CallWindowProcW
DispatchMessageA
GetClassInfoA
GetMenuInfo
GetSysColor
DispatchMessageA
DrawTextA
GetCursorInfo
stclient
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
ntshrui
IsPathSharedA
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ