Static task
static1
Behavioral task
behavioral1
Sample
d963ae531c885d9d3672fa04d854db81cab88ef5941c11bed40a4a7b80de42c0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d963ae531c885d9d3672fa04d854db81cab88ef5941c11bed40a4a7b80de42c0.exe
Resource
win10v2004-20220812-en
General
-
Target
d963ae531c885d9d3672fa04d854db81cab88ef5941c11bed40a4a7b80de42c0
-
Size
189KB
-
MD5
a17ae2bde5094ce5ccf67e0a1f2d36c0
-
SHA1
945ea2077939e0e6ef000850015adf0192efb388
-
SHA256
d963ae531c885d9d3672fa04d854db81cab88ef5941c11bed40a4a7b80de42c0
-
SHA512
e963ec195dd5db7a87481c52964ff5aa11eaf9d53775f7c5fb132bcf18a7301a412bc49ab2d34c666fd46fa2f5f78775e00b014af1203dd06c2f5933faf8f6d7
-
SSDEEP
3072:7VnoEMiTMUgt4JNLlBAXKHb7sqqRwHNCwjDvL4YQ0qMlydsNUmXYH:5MSaeNLlBAaH/stRmxjDD3Q0j0SNU5
Malware Config
Signatures
Files
-
d963ae531c885d9d3672fa04d854db81cab88ef5941c11bed40a4a7b80de42c0.exe windows x86
51c90e5ec37abada3022f6c533ad0b76
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SendMessageA
FindWindowA
IsWindow
MessageBoxA
PostMessageA
GetActiveWindow
kernel32
GetEnvironmentStringsW
SetHandleCount
LoadLibraryA
GetProcAddress
HeapReAlloc
VirtualAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
GetCPInfo
GetACP
GetOEMCP
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
HeapFree
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
LCMapStringA
RtlUnwind
WriteFile
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
HeapAlloc
Sections
.text Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE