?CreateDlgMessage@@YGHPAXPADK|U
Static task
static1
Behavioral task
behavioral1
Sample
fd1b6948a514e50d007a1c2232c56b66ba245e52039eaf0bb01c08d0ade5cdca.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fd1b6948a514e50d007a1c2232c56b66ba245e52039eaf0bb01c08d0ade5cdca.exe
Resource
win10v2004-20221111-en
General
-
Target
fd1b6948a514e50d007a1c2232c56b66ba245e52039eaf0bb01c08d0ade5cdca
-
Size
175KB
-
MD5
c168b6d0407d252fd99ee90ac6d507b2
-
SHA1
ad50d44a954a9547590afd7f40b23dbffa9db9b0
-
SHA256
fd1b6948a514e50d007a1c2232c56b66ba245e52039eaf0bb01c08d0ade5cdca
-
SHA512
e21e431a046de6a55b81cf3f0467c650a7279e3a4345146c4f2cd45b5ee2d01d540c0613853d9cd702dc9a95da53650926782c021ee79a45f200f73777ea0b68
-
SSDEEP
3072:1iYlcLILRDLjcIiShhm9xLWX3LtSRGK6jUouGYK9/I6vrM:llcgZ4IiVxLWnLtWHfGYK26
Malware Config
Signatures
Files
-
fd1b6948a514e50d007a1c2232c56b66ba245e52039eaf0bb01c08d0ade5cdca.exe windows x86
169ff4412a42e0fa59f9e17c1e55ab28
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DefFrameProcW
ChildWindowFromPoint
GetDoubleClickTime
SetTimer
GetWindowDC
SetScrollRange
wsprintfW
TrackPopupMenu
LoadStringW
GetScrollRange
ModifyMenuW
IsCharUpperW
CharNextExA
HideCaret
MapVirtualKeyExW
IsDialogMessageW
GetClientRect
gdi32
ExtFloodFill
DPtoLP
RoundRect
SetDIBColorTable
GetSystemPaletteEntries
ExtTextOutA
kernel32
lstrlenA
lstrcpyA
RemoveDirectoryA
HeapSize
GetModuleFileNameA
CreateWaitableTimerA
GetModuleHandleA
VerifyVersionInfoW
DeviceIoControl
LoadLibraryA
shlwapi
ChrCmpIW
UrlEscapeA
msvcrt
_controlfp
atoi
_wtoi
__set_app_type
__p__fmode
__p__commode
_amsg_exit
_initterm
_ismbblead
_XcptFilter
memset
_exit
strspn
isspace
_cexit
__setusermatherr
__getmainargs
fflush
Exports
Exports
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ort Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 144KB - Virtual size: 331KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE