_I_wtn@16
Static task
static1
Behavioral task
behavioral1
Sample
a6e760b743c98b0f3adae1baf31b63ed27ff1d208bd6e86c0fe91bb1bc064072.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a6e760b743c98b0f3adae1baf31b63ed27ff1d208bd6e86c0fe91bb1bc064072.exe
Resource
win10v2004-20220812-en
General
-
Target
a6e760b743c98b0f3adae1baf31b63ed27ff1d208bd6e86c0fe91bb1bc064072
-
Size
141KB
-
MD5
0fda67096e21be4870601db284b5d29e
-
SHA1
b03c97fd1b78df2dac03427dc319220799d8d524
-
SHA256
a6e760b743c98b0f3adae1baf31b63ed27ff1d208bd6e86c0fe91bb1bc064072
-
SHA512
cbb0ab1c8bcd57fd2d832c3c228888f19fef8ccaf88da311f9082749c65a2e643df402d4b948faed1f2292d592a1bd4df26bdda18283168dbdc3619704eeb443
-
SSDEEP
3072:jcm34BS6wZl0R4Q51XUzLMiSdHojXnCnTJ/hjC409D:jcm0St0R4QmLdCoj3CnhBV
Malware Config
Signatures
Files
-
a6e760b743c98b0f3adae1baf31b63ed27ff1d208bd6e86c0fe91bb1bc064072.exe windows x86
6c5b4ff5e2232702966aabc61ca1719e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ShowWindow
CharUpperA
GetScrollInfo
GetIconInfo
KillTimer
GetKeyState
DispatchMessageA
SetRect
UnregisterClassA
SetScrollRange
WaitMessage
InsertMenuA
GetWindowLongW
GetWindowPlacement
GetCursor
ClientToScreen
GetTopWindow
RegisterWindowMessageA
GetSysColor
WindowFromPoint
LoadBitmapA
PostMessageA
CreateMenu
GetMenu
DestroyCursor
GetWindow
CharLowerBuffA
SystemParametersInfoA
DefWindowProcA
DefMDIChildProcA
SetWindowLongW
GetDCEx
GetCapture
PeekMessageA
CallWindowProcA
MapVirtualKeyA
LoadCursorA
GetWindowRect
CharNextA
EndPaint
DrawMenuBar
DrawFrameControl
GetParent
GetClientRect
InflateRect
GetDlgItem
ReleaseCapture
GetKeyboardType
PostQuitMessage
SetMenu
GetSystemMetrics
SetScrollPos
GetKeyboardState
GetFocus
GetWindowTextLengthA
SetParent
UpdateWindow
IsWindowVisible
GetScrollRange
EmptyClipboard
IsZoomed
kernel32
GetStringTypeW
lstrcmpA
SizeofResource
GetStdHandle
VirtualQuery
SetEvent
ReadFile
EnterCriticalSection
LockResource
GetFileType
GetLastError
ExitProcess
WaitForSingleObject
GetFullPathNameA
VirtualAlloc
GetCurrentThreadId
GetCommandLineW
GetCurrentProcess
MoveFileA
FindClose
LoadLibraryA
GetUserDefaultLCID
IsBadReadPtr
LoadResource
gdi32
SetPixel
CreateDIBitmap
shell32
DragQueryFileA
Shell_NotifyIconW
SHGetSpecialFolderLocation
Exports
Exports
Sections
.text Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.badata Size: 512B - Virtual size: 319B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ