Static task
static1
Behavioral task
behavioral1
Sample
4e1361e09b7cf61a5b2ef9f98ceb093842b3736548bae4abbcdead22cdd108e9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4e1361e09b7cf61a5b2ef9f98ceb093842b3736548bae4abbcdead22cdd108e9.exe
Resource
win10v2004-20220901-en
General
-
Target
4e1361e09b7cf61a5b2ef9f98ceb093842b3736548bae4abbcdead22cdd108e9
-
Size
652KB
-
MD5
6d2b071acf3faf2884d810a1c1a8886c
-
SHA1
4980906566d40d7f2acc9eba77a5ecf52f24f90e
-
SHA256
4e1361e09b7cf61a5b2ef9f98ceb093842b3736548bae4abbcdead22cdd108e9
-
SHA512
773caa9d87d8bb020367387022a4976d37d6a5870835db381b3ddb651959bb7c9d15569d9f1e0c965b96cdac37c75e48cdd509bce6e705855bc80610fc830394
-
SSDEEP
6144:7py6PENprsLBo6obE3zgBTTHxB36691kK4HSTxDUs9uNIG4T:7VuprsCvbszQHxt6691kK46UrIGc
Malware Config
Signatures
Files
-
4e1361e09b7cf61a5b2ef9f98ceb093842b3736548bae4abbcdead22cdd108e9.exe windows x86
24ab8cfbd7a9db34d76ea139e619af3c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CreateAcceleratorTableW
UnhookWindowsHook
ValidateRgn
RegisterWindowMessageW
MoveWindow
GetClassNameW
CharUpperA
GetDesktopWindow
DefWindowProcA
FindWindowExA
kernel32
lstrcmpiA
SetCommTimeouts
EnumTimeFormatsW
DeleteCriticalSection
WriteFile
ExitProcess
DeleteFiber
PeekConsoleInputW
GetProcessHeap
EndUpdateResourceA
GetPrivateProfileStringW
ReadConsoleA
SetTimeZoneInformation
ExitThread
PurgeComm
PulseEvent
RaiseException
EnumResourceLanguagesW
GlobalDeleteAtom
ReadDirectoryChangesW
GetSystemTimeAsFileTime
WriteProcessMemory
GlobalFindAtomA
GetLocaleInfoW
GlobalFree
GetTapeStatus
lstrcmpiW
VirtualQueryEx
ReleaseMutex
IsBadWritePtr
EnumResourceNamesA
TlsGetValue
GetProfileStringA
IsValidLocale
GetConsoleCursorInfo
GetHandleInformation
GetThreadPriority
ws2_32
WSALookupServiceEnd
getservbyname
gethostbyaddr
select
shutdown
gdi32
SetPolyFillMode
PolylineTo
CombineRgn
AddFontResourceW
Sections
.text Size: 305KB - Virtual size: 304KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 333KB - Virtual size: 333KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ