Static task
static1
Behavioral task
behavioral1
Sample
fa292f45bf8ecebd69a9015fbb25925944da3363d16085d720e8dff95699db38.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fa292f45bf8ecebd69a9015fbb25925944da3363d16085d720e8dff95699db38.exe
Resource
win10v2004-20221111-en
General
-
Target
fa292f45bf8ecebd69a9015fbb25925944da3363d16085d720e8dff95699db38
-
Size
22KB
-
MD5
1674164c2c3a9b4f21f183f537c1dc03
-
SHA1
8cbf950541dab3ccc8c7d8020c52f7a2cbcf4dfc
-
SHA256
fa292f45bf8ecebd69a9015fbb25925944da3363d16085d720e8dff95699db38
-
SHA512
20bca5d4d19ebf597019048bedb9d4e08c7b95f97e37806a7152af3b3edc0aaad24a6b9fefe96ef8cc1cd9f0e1d1ed40d773ccde61d0a0224df4b07ec6aff632
-
SSDEEP
384:rEjdI5akvRk0G80ohcuHoOJLp281qDc+3:rEpIJJkfscq3N2+n+
Malware Config
Signatures
Files
-
fa292f45bf8ecebd69a9015fbb25925944da3363d16085d720e8dff95699db38.exe windows x86
6b111e878a7b0e609950a4fe333f3a01
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
user32
SendMessageA
SetFocus
SendDlgItemMessageA
wsprintfA
PostQuitMessage
GetWindowRect
SetWindowPos
MoveWindow
GetDlgItem
GetSystemMetrics
DialogBoxParamA
kernel32
GetLocalTime
ReadFile
GetVersionExA
GetTempPathA
GetComputerNameA
HeapDestroy
DeleteCriticalSection
lstrcatA
GetProcessHeap
HeapAlloc
GetTickCount
CloseHandle
GetFileSize
EnterCriticalSection
LeaveCriticalSection
lstrcpyA
GetStartupInfoA
ExitProcess
CreateFileA
GetModuleHandleA
GetEnvironmentStringsA
gdi32
CreateFontIndirectA
comctl32
InitCommonControlsEx
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ