Static task
static1
Behavioral task
behavioral1
Sample
74ba51daaad76e8eeeb974d2beb0472bf186ff725b40e574534b810d697b7918.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
74ba51daaad76e8eeeb974d2beb0472bf186ff725b40e574534b810d697b7918.exe
Resource
win10v2004-20220812-en
General
-
Target
74ba51daaad76e8eeeb974d2beb0472bf186ff725b40e574534b810d697b7918
-
Size
210KB
-
MD5
491cc966185a8ec58d35a70a6d03c2a0
-
SHA1
039f6d3ad807663aa1b9d6cec804aae05c9f140d
-
SHA256
74ba51daaad76e8eeeb974d2beb0472bf186ff725b40e574534b810d697b7918
-
SHA512
a7f11fa9bf27971b23237ca382d20c1c63d0898c0ab22f1ac5b39d5d43cce1d0921384658c29a93aaa775a97e7586b9af8c5a9002d30be354c32b19dfda4b97d
-
SSDEEP
3072:z3qlGsK+cVZj/S62ooFB1ShwYMh55c1y3Lxyz0GMwk7Lw+Iaqi7WQkYTmRnv:z3Kc+A/+VfVlrGMwEWQkkmh
Malware Config
Signatures
Files
-
74ba51daaad76e8eeeb974d2beb0472bf186ff725b40e574534b810d697b7918.exe windows x86
485aa28273efcd056a922fc097057d79
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
Chord
CopyEnhMetaFileA
CreatePatternBrush
DeleteMetaFile
DeleteObject
EndDoc
EndPath
EnumMetaFile
ExtCreatePen
FillPath
FrameRgn
GetBkMode
GetCurrentPositionEx
GetNearestColor
GetTextExtentPoint32A
GetViewportOrgEx
IntersectClipRect
MaskBlt
RemoveFontResourceA
SelectClipRgn
SetEnhMetaFileBits
SetTextColor
SetTextJustification
kernel32
CopyFileA
CreateProcessW
ExitThread
FileTimeToDosDateTime
GetCommandLineW
GetConsoleOutputCP
GetExitCodeProcess
GetFileSize
GetModuleFileNameW
GetProcessHeap
GetShortPathNameA
GetVersion
GlobalAddAtomA
GlobalHandle
IsValidCodePage
LocalFree
MulDiv
ReleaseMutex
ResumeThread
SetEndOfFile
SetEvent
SetThreadLocale
TerminateProcess
TlsFree
lstrcmpA
lstrcmpiW
user32
CallWindowProcA
ClientToScreen
CreatePopupMenu
DestroyIcon
DialogBoxParamA
DrawTextA
GetClientRect
GetDlgItem
GetMenuItemID
GetMenuStringA
GetSubMenu
GetSysColorBrush
GetTopWindow
InvalidateRect
LoadStringA
PostQuitMessage
RemovePropA
SetClassLongA
SetScrollInfo
SetWindowLongA
SetWindowPlacement
SetWindowTextA
TranslateMessage
shell32
DragQueryFile
DragQueryFileA
DragQueryPoint
ExtractAssociatedIconW
ExtractIconExW
ExtractIconW
SHAppBarMessage
SHBrowseForFolderA
SHCreateDirectoryExA
SHGetDesktopFolder
SHGetFolderPathW
SHGetMalloc
SHGetPathFromIDListA
SHGetPathFromIDListW
SHGetSettings
SHGetSpecialFolderPathW
ShellExecuteA
ShellExecuteEx
ShellExecuteW
Shell_NotifyIconA
Shell_NotifyIconW
Sections
.text Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
pIJpRmpe Size: 512B - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE