Static task
static1
Behavioral task
behavioral1
Sample
04725e8e41aca5b4d9a88679d76c988e301a60bfdc7ac267add50d5fc98db40c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
04725e8e41aca5b4d9a88679d76c988e301a60bfdc7ac267add50d5fc98db40c.exe
Resource
win10v2004-20220812-en
General
-
Target
04725e8e41aca5b4d9a88679d76c988e301a60bfdc7ac267add50d5fc98db40c
-
Size
1016KB
-
MD5
01bb9fdc5647fce6086d8cfcfa295390
-
SHA1
5f8df44624dc0333df1f6e1efc2f8e2040503981
-
SHA256
04725e8e41aca5b4d9a88679d76c988e301a60bfdc7ac267add50d5fc98db40c
-
SHA512
394d2018f08ce16f00e31caa754b5486edb55734d609f6dd4d8094af7d2da58be8a1e3118dbb4b3aaee5dd913c02b4f9f878aa544289fbe163b08ea1407dc8f5
-
SSDEEP
12288:feIulb1dg6NmaqNbdoC4iyjyLqudRyG0Y9wDL5Bt2HqZT0YPPQ7z:mIuTuYDq58U6EwDFQYP4
Malware Config
Signatures
Files
-
04725e8e41aca5b4d9a88679d76c988e301a60bfdc7ac267add50d5fc98db40c.exe windows x86
8b882361f954a3888ea9d7f889447a70
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxA
CharNextW
UpdateWindow
InvalidateRgn
MessageBeep
GetNextDlgGroupItem
SystemParametersInfoW
GetMenuStringW
ScreenToClient
CreateDialogParamW
kernel32
GetProcAddress
WaitForSingleObject
ActivateActCtx
CreateActCtxA
CreateThread
ExitProcess
GetCurrentDirectoryA
GetModuleHandleA
LoadLibraryA
Sleep
VirtualAlloc
VirtualFree
VirtualProtect
DuplicateHandle
LocalReAlloc
GlobalSize
shell32
ShellExecuteW
ShellExecuteExW
DragFinish
DragQueryFileW
advapi32
RegOpenKeyW
RegCloseKey
RegQueryValueExW
RegCreateKeyExW
ole32
CoRegisterMessageFilter
comctl32
ImageList_Create
_TrackMouseEvent
ImageList_Destroy
ImageList_Add
ImageList_GetIconSize
comdlg32
GetSaveFileNameW
Sections
.text Size: 985KB - Virtual size: 984KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE