Static task
static1
Behavioral task
behavioral1
Sample
1abc65682dd189ecfacb7a4acd764ba1e678efe5f53b7696b6298dffa395200d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1abc65682dd189ecfacb7a4acd764ba1e678efe5f53b7696b6298dffa395200d.exe
Resource
win10v2004-20220812-en
General
-
Target
1abc65682dd189ecfacb7a4acd764ba1e678efe5f53b7696b6298dffa395200d
-
Size
21KB
-
MD5
cc916b45801fd6551a7df44bee832350
-
SHA1
b9261585a5ef159eb62f96d665bfb449a591e7b3
-
SHA256
1abc65682dd189ecfacb7a4acd764ba1e678efe5f53b7696b6298dffa395200d
-
SHA512
476bc4c3dbae7d4705e3c1aef3e2a0f8fd797438dd2d68c12b9432b98ac4c2c6212baaba0f239d7a973dc1e1080dbcf39a013fcc9c853537d4c5820fded98282
-
SSDEEP
384:sazV5Hy9902czXwfUg8jggGCMXTZUokQhrsU8BaYvFLrC6+fUAORBO:l+4FX3BjggGCMXTAQsrtLG6xA8
Malware Config
Signatures
Files
-
1abc65682dd189ecfacb7a4acd764ba1e678efe5f53b7696b6298dffa395200d.exe windows x86
43099be211e13dfd8cd23feca7c30760
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateEventA
CreateThread
FindFirstFileA
FreeLibrary
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetFileAttributesA
GetLocalTime
GetProcessHeap
GetStartupInfoA
GetSystemDefaultLCID
LoadLibraryA
MulDiv
SetEvent
Sleep
TerminateThread
user32
AdjustWindowRectEx
CharNextA
ClientToScreen
FindWindowA
GetActiveWindow
GetClassNameW
GetClientRect
GetDlgCtrlID
GetMenuItemID
GetScrollInfo
GetSubMenu
GetSystemMetrics
InsertMenuW
IsRectEmpty
IsWindow
PostMessageW
PtInRect
SendNotifyMessageW
SetCursorPos
SetWindowLongW
SubtractRect
UnregisterClassW
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE