9_McdKhjxS8
Static task
static1
Behavioral task
behavioral1
Sample
d864f19e93c3f437e9029b8cb03b7f61fcf36646a4c0bc7a3614262c8b0a1bff.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d864f19e93c3f437e9029b8cb03b7f61fcf36646a4c0bc7a3614262c8b0a1bff.exe
Resource
win10v2004-20220812-en
General
-
Target
d864f19e93c3f437e9029b8cb03b7f61fcf36646a4c0bc7a3614262c8b0a1bff
-
Size
97KB
-
MD5
925071f587a7cc2fe5bc8d8f6762bea7
-
SHA1
d05cd93d780346b0346a228fc7c6818e69050b0e
-
SHA256
d864f19e93c3f437e9029b8cb03b7f61fcf36646a4c0bc7a3614262c8b0a1bff
-
SHA512
90bc8cfd706246578cfb3d88b4d2b739c610f639dfac819efbfdd1a46a7a1f0f501f9e72785d92cd84bafa22def90a23ac2ea5b8a1c848a0e8da6ab7946744fb
-
SSDEEP
1536:ga9MDQXMwkVxKSNCzkg6udCv8kbVjC6Dd1jYa4ZJJibMwt1h4m7:B9MD3xK2kkvjbPp1jYaMVwt1mW
Malware Config
Signatures
Files
-
d864f19e93c3f437e9029b8cb03b7f61fcf36646a4c0bc7a3614262c8b0a1bff.exe windows x86
8f94a7b23555d3d040b4d3f2e8b1cd1d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
RegisterClipboardFormatA
CharNextA
GetWindowDC
SetWindowLongW
ShowOwnedPopups
GetMenuStringA
GetPropA
FillRect
CallNextHookEx
GetKeyboardLayoutList
EnumChildWindows
LoadIconA
IsCharLowerA
InflateRect
GetMessagePos
RedrawWindow
SetScrollRange
LoadBitmapA
GetParent
GetMenuItemCount
CloseClipboard
PeekMessageW
GetMenu
GetSystemMetrics
SetPropA
GetWindowRect
TranslateMessage
CreateWindowExA
GetMenuItemID
DrawIcon
PeekMessageA
IsWindowVisible
WaitMessage
EnableScrollBar
SetWindowPlacement
IsChild
CreateMenu
IsIconic
GetKeyboardState
UpdateWindow
GetFocus
GetTopWindow
SetFocus
IsRectEmpty
CreatePopupMenu
EnumThreadWindows
DispatchMessageW
wsprintfA
GetDCEx
EmptyClipboard
GetSubMenu
IsWindowUnicode
SetMenuItemInfoA
CreateIcon
GetKeyNameTextA
RegisterClassA
IsWindowEnabled
LoadStringA
IsDlgButtonChecked
PostMessageA
EndPaint
ChildWindowFromPoint
GetDesktopWindow
EnableMenuItem
msvcrt
tolower
sqrt
time
sprintf
mbstowcs
calloc
atol
memmove
srand
memset
kernel32
GetDiskFreeSpaceA
LoadLibraryA
lstrlenW
GetEnvironmentStrings
VirtualAlloc
GetACP
GetFileAttributesA
GetCommandLineA
GetProcessHeap
InitializeCriticalSection
GetFullPathNameA
GetThreadLocale
LocalReAlloc
GetFileSize
SetLastError
GlobalAlloc
lstrcmpiA
GetSystemDefaultLangID
GetModuleHandleA
GlobalAddAtomA
GetOEMCP
SetErrorMode
ExitProcess
lstrcpynA
GetStartupInfoA
shlwapi
SHDeleteKeyA
SHGetValueA
SHEnumValueA
Exports
Exports
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.badata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ