Static task
static1
Behavioral task
behavioral1
Sample
69a37c6721d9e9ae1b7e2d0fae7c2adb6037b58a90f37a46f45f3fdac32ebc77.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
69a37c6721d9e9ae1b7e2d0fae7c2adb6037b58a90f37a46f45f3fdac32ebc77.exe
Resource
win10v2004-20220812-en
General
-
Target
69a37c6721d9e9ae1b7e2d0fae7c2adb6037b58a90f37a46f45f3fdac32ebc77
-
Size
81KB
-
MD5
83dc947b6fafeaa180e65cd7c4807c60
-
SHA1
fa19f6f2ba5df2dd9e08eba926d6aa34e52eecf1
-
SHA256
69a37c6721d9e9ae1b7e2d0fae7c2adb6037b58a90f37a46f45f3fdac32ebc77
-
SHA512
a160a3d5ab4941da731c0959ff27e8ce6ee36148b635a876aca19d0027f80253f6acfd7f462275dc5edd97f6165e3ef68f6dc2aa6764783450e40e0aee92e405
-
SSDEEP
1536:O7p8+PrPHYauBop61nV+d3Hnt5D+wpIo70qu43dmuck:o8+jPYauB06JM3HLbpIo043guH
Malware Config
Signatures
Files
-
69a37c6721d9e9ae1b7e2d0fae7c2adb6037b58a90f37a46f45f3fdac32ebc77.exe windows x86
2b1455a8d180184397bf9e5d87029386
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
EqualRect
PostQuitMessage
EnumWindows
EnableMenuItem
SetWindowPos
FrameRect
GetSubMenu
GetScrollPos
GetSysColor
GetMessageA
GetSysColorBrush
SetWindowTextA
UnhookWindowsHookEx
kernel32
GetFileAttributesA
GetThreadLocale
ExitProcess
GetACP
VirtualAllocEx
GetTempPathA
RtlUnwind
GetSystemTime
GetCurrentProcessId
SetUnhandledExceptionFilter
GetStartupInfoA
GetTimeZoneInformation
FileTimeToSystemTime
InterlockedExchange
gdi32
DPtoLP
SelectClipPath
CreateCompatibleBitmap
FillRgn
ExcludeClipRect
CreateICW
SetViewportExtEx
CopyEnhMetaFileA
GetMapMode
ole32
StringFromGUID2
CoCreateInstance
CoInitialize
CoRevokeClassObject
CoInitializeSecurity
CoTaskMemRealloc
StgOpenStorage
OleRun
DoDragDrop
advapi32
CheckTokenMembership
GetSecurityDescriptorDacl
CryptHashData
RegQueryValueExW
RegCreateKeyExW
QueryServiceStatus
FreeSid
RegCreateKeyA
GetUserNameA
AdjustTokenPrivileges
msvcrt
fprintf
_fdopen
puts
_mbscmp
__initenv
_lock
strncpy
iswspace
signal
_strdup
strlen
__getmainargs
__setusermatherr
raise
strcspn
fflush
_flsbuf
_CIpow
comctl32
ImageList_GetIcon
ImageList_LoadImageA
ImageList_GetBkColor
InitCommonControls
CreatePropertySheetPageA
ImageList_Destroy
ImageList_SetIconSize
ImageList_DragEnter
ImageList_Write
ImageList_DrawEx
ImageList_ReplaceIcon
ImageList_LoadImageW
ImageList_GetIconSize
shell32
DragQueryFileA
SHBrowseForFolderA
DragAcceptFiles
ShellExecuteEx
CommandLineToArgvW
ExtractIconExW
ShellExecuteW
ExtractIconW
DoEnvironmentSubstW
DragQueryFileW
SHGetPathFromIDList
oleaut32
VariantCopy
SysReAllocStringLen
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayCreate
SafeArrayUnaccessData
SafeArrayGetUBound
SafeArrayRedim
Sections
.text Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE