Static task
static1
Behavioral task
behavioral1
Sample
885e5bf41ef32604a2354ccd9696fe892ea7fac896bc76012d77a273c9800ceb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
885e5bf41ef32604a2354ccd9696fe892ea7fac896bc76012d77a273c9800ceb.exe
Resource
win10v2004-20220901-en
General
-
Target
885e5bf41ef32604a2354ccd9696fe892ea7fac896bc76012d77a273c9800ceb
-
Size
255KB
-
MD5
2114ee8e4c896a911be3bc426d8fc250
-
SHA1
16a5973e3ce9d970debfe068cf8646b08ab9df57
-
SHA256
885e5bf41ef32604a2354ccd9696fe892ea7fac896bc76012d77a273c9800ceb
-
SHA512
8412602a94f0727cae9bb9be1a6c8c00e6948ddaa722213d0917c5ba2518f596aee46f35de838c20a8ed6abb2a6d50027b1a988871ca925d07714bfae0631b9d
-
SSDEEP
6144:6WFLIoTvEFeRIedJ87Zn4k8q+Xj+F8IH7O/E:thT6eGmC4nz+F8IbO/
Malware Config
Signatures
Files
-
885e5bf41ef32604a2354ccd9696fe892ea7fac896bc76012d77a273c9800ceb.exe windows x86
fd0f06ecbd5d0bb74c2399a2769ad23d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EnableWindow
SendMessageW
ClientToScreen
GetWindowThreadProcessId
IsIconic
IsWindow
EnableMenuItem
GetForegroundWindow
GetParent
RegisterWindowMessageW
SetCursor
LoadCursorW
GetWindowLongW
DefWindowProcW
LoadStringW
GetClientRect
FindWindowW
GetActiveWindow
SetForegroundWindow
SystemParametersInfoW
MonitorFromWindow
SetWindowPos
GetDesktopWindow
CallWindowProcW
GetWindowRect
EnumChildWindows
TrackPopupMenuEx
AttachThreadInput
FlashWindow
MonitorFromPoint
GetSystemMenu
GetSystemMetrics
LoadIconW
GetWindow
SetWindowLongW
ShowWindow
CharNextW
PostMessageW
GetMonitorInfoW
GetDlgItem
MapWindowPoints
AllowSetForegroundWindow
GetClassNameW
IsWindowEnabled
ole32
CoCreateInstance
CoTaskMemFree
CLSIDFromProgID
CoGetMalloc
StringFromCLSID
CoTaskMemAlloc
CoTaskMemRealloc
oleaut32
VarUI4FromStr
kernel32
HeapSize
SetCurrentDirectoryW
OutputDebugStringW
LocalFree
VirtualAlloc
GetCurrentThreadId
GetTempPathW
FindResourceW
IsDebuggerPresent
CloseHandle
UnhandledExceptionFilter
LeaveCriticalSection
LocalAlloc
FlushInstructionCache
FindResourceExW
SizeofResource
GetCurrentDirectoryW
RaiseException
GetFileSize
lstrcmpiW
LockResource
lstrlenA
GetShortPathNameW
DeleteCriticalSection
lstrlenW
ReadFile
ProcessIdToSessionId
WideCharToMultiByte
GetModuleHandleW
LoadLibraryExW
HeapReAlloc
DisableThreadLibraryCalls
LoadResource
EnterCriticalSection
SetUnhandledExceptionFilter
GetProcessHeap
HeapAlloc
IsProcessorFeaturePresent
FormatMessageW
GetUserDefaultLangID
VirtualFree
HeapFree
CreateFileW
GetSystemTimeAsFileTime
WTSGetActiveConsoleSessionId
HeapDestroy
FreeLibrary
IsValidLocale
VirtualAllocEx
IsBadWritePtr
comdlg32
GetOpenFileNameW
CommDlgExtendedError
userenv
GetAllUsersProfileDirectoryW
GetProfileType
GetProfilesDirectoryW
EnterCriticalPolicySection
DeleteProfileA
panmap
DllCanUnloadNow
Sections
.text Size: 223KB - Virtual size: 223KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.omiFFHX Size: 1024B - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.TtiEFEX Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hHrqLvX Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pPtnLvX Size: 1024B - Virtual size: 871B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hsalxlv Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rWlDynv Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ