Static task
static1
Behavioral task
behavioral1
Sample
3e6572ebfadbd0193c7461175f665b679ebc88c386d5c5e750c736179c35b732.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3e6572ebfadbd0193c7461175f665b679ebc88c386d5c5e750c736179c35b732.exe
Resource
win10v2004-20220901-en
General
-
Target
3e6572ebfadbd0193c7461175f665b679ebc88c386d5c5e750c736179c35b732
-
Size
598KB
-
MD5
a2c23afd3943e7abbcf28e220a4ffb10
-
SHA1
1b863667be312c6969f42b6d2cb6c74800cd2c47
-
SHA256
3e6572ebfadbd0193c7461175f665b679ebc88c386d5c5e750c736179c35b732
-
SHA512
5f1f1b8585401e879c9271fc170fcb7c3cd80551a787960c31ba3d23fe35277e05beb983b012d7f50bd9ba60af167fddf96d4e96b8746eea65fbb31a68cf5283
-
SSDEEP
6144:Xf3nSK1ae5HXQPFfH7d97qPU2sXUtnEPXs8SrTiJHltUnV6F/Q649nv9Eymunv+k:XfCK1aSiFesN6iV7VQ6iiMmt+1hZjV9
Malware Config
Signatures
Files
-
3e6572ebfadbd0193c7461175f665b679ebc88c386d5c5e750c736179c35b732.exe windows x86
d5cbbb05a14abe75caf4858c26e13e1f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxA
GetDC
GetClassNameW
KillTimer
CreateDialogIndirectParamW
DispatchMessageW
SetWindowTextW
DrawTextW
GetMessagePos
GetDoubleClickTime
SetForegroundWindow
DeferWindowPos
ClipCursor
GetMenu
MapDialogRect
DrawStateW
EndDialog
WindowFromPoint
UnhookWindowsHookEx
SetCapture
SetParent
DefWindowProcW
kernel32
ActivateActCtx
CreateActCtxA
CreateThread
ExitProcess
GetACP
GetModuleHandleA
GetProcAddress
GetProcessHeap
LoadLibraryA
Sleep
VirtualAlloc
VirtualFree
VirtualProtect
WaitForSingleObject
GetProfileIntW
GetCurrentProcess
lstrcmpA
SetEnvironmentVariableA
GetVersionExA
FreeResource
EnumResourceLanguagesW
gdi32
SetTextColor
GetTextColor
Sections
.text Size: 493KB - Virtual size: 493KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE