_i26bNWj5uJH
Static task
static1
Behavioral task
behavioral1
Sample
0dc4e1028b9a9c317b3e235f62631c8f2f135e00ebf3a7e7142b27fb18423989.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0dc4e1028b9a9c317b3e235f62631c8f2f135e00ebf3a7e7142b27fb18423989.exe
Resource
win10v2004-20221111-en
General
-
Target
0dc4e1028b9a9c317b3e235f62631c8f2f135e00ebf3a7e7142b27fb18423989
-
Size
154KB
-
MD5
435897216b8f93bcd0ad293fdb744838
-
SHA1
b879f0fb137f4ca4ae26400ff9b020709206b20a
-
SHA256
0dc4e1028b9a9c317b3e235f62631c8f2f135e00ebf3a7e7142b27fb18423989
-
SHA512
8486fe08a2b063d1dd74fa47cc9ee090eaa070e04c850a8a3012dce1b988de32fbc2e02a4c4fff5a3ae60033b0c0ce6742586f0d2dffe39f8ace0f01b9660b35
-
SSDEEP
3072:nYJtpsACSYXx8FFZh9nqP7r7NPGnzAET9b+P8v:nOtKz8dh2cnX
Malware Config
Signatures
Files
-
0dc4e1028b9a9c317b3e235f62631c8f2f135e00ebf3a7e7142b27fb18423989.exe windows x86
517646eadc427a2a016d8bb501d2b469
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadKeyboardLayoutA
OpenClipboard
CreatePopupMenu
AdjustWindowRectEx
LoadBitmapA
GetDlgItem
GetCursorPos
GetMenuItemCount
KillTimer
SetWindowPlacement
SetPropA
ShowScrollBar
CallWindowProcA
CharNextW
wsprintfA
DrawEdge
DrawIconEx
CheckMenuItem
IsCharLowerA
GetKeyNameTextA
GetKeyboardType
CallNextHookEx
SetWindowLongA
SetMenuItemInfoA
IsWindowEnabled
CharUpperBuffA
DrawAnimatedRects
EnableWindow
SetCapture
GetMenuState
ReleaseDC
GetCursor
DrawTextA
GetWindow
SetWindowTextA
EnumWindows
GetSubMenu
ActivateKeyboardLayout
SetCursor
IsWindowUnicode
GetWindowLongA
CharToOemA
CharUpperA
IsMenu
DefFrameProcA
EnumChildWindows
GetScrollRange
IsRectEmpty
CharNextA
GetClassInfoA
SetTimer
OffsetRect
IsCharUpperA
GetWindowPlacement
GetClientRect
SetClassLongA
GetMenu
DefMDIChildProcA
SetParent
DispatchMessageW
CreateMenu
GetClassLongA
kernel32
LoadResource
IsBadHugeReadPtr
GetThreadLocale
ExitProcess
lstrcmpA
GetEnvironmentStrings
VirtualAllocEx
HeapFree
lstrlenW
HeapDestroy
GlobalFindAtomA
GlobalAlloc
GetModuleFileNameA
GetCommandLineW
ExitThread
Sleep
RaiseException
VirtualAlloc
GetDiskFreeSpaceA
LoadLibraryA
GetCurrentProcessId
VirtualFree
shell32
SHGetDesktopFolder
Shell_NotifyIconW
SHGetFileInfoA
SHGetFolderPathA
DragQueryFileA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
Exports
Exports
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.badata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ