Static task
static1
Behavioral task
behavioral1
Sample
d7b46e49900357ed12cfbd5e18821c3a68c0b338d686a0772fd14b855e656367.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d7b46e49900357ed12cfbd5e18821c3a68c0b338d686a0772fd14b855e656367.exe
Resource
win10v2004-20220812-en
General
-
Target
d7b46e49900357ed12cfbd5e18821c3a68c0b338d686a0772fd14b855e656367
-
Size
925KB
-
MD5
121d472ae5b13cf7e095883dd37e184a
-
SHA1
bbdb2230cfb046f2484231df7b2c9a89f96ef4a6
-
SHA256
d7b46e49900357ed12cfbd5e18821c3a68c0b338d686a0772fd14b855e656367
-
SHA512
475d03dfa083eeaf7c952de054ec84c54e1e4f91d9e72a4894b333d5e8a3a44de2c3a70b7cd1d5aeb797eae4243be18b804d0101ccaa940e098cd07c9acef349
-
SSDEEP
12288:7B+0OxXfG/kq3J8oRbBNt+TmDpcdTTyhf2hB+:7DOxXKkkJyzXyhfh
Malware Config
Signatures
Files
-
d7b46e49900357ed12cfbd5e18821c3a68c0b338d686a0772fd14b855e656367.exe windows x86
6332cbc9474a6fe094882991ba8ddb9f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
FreeConsole
MulDiv
MoveFileExW
GetPrivateProfileIntA
MapViewOfFile
CopyFileW
user32
CharPrevA
SetRect
GetDlgCtrlID
GetWindowInfo
GetMenuItemID
SetRectEmpty
comctl32
ImageList_Read
ImageList_DragShowNolock
ImageList_Replace
FlatSB_SetScrollInfo
DestroyPropertySheetPage
ImageList_EndDrag
ImageList_Write
oleaut32
SafeArrayCreate
SafeArrayGetLBound
SafeArrayGetUBound
VariantCopy
SysReAllocStringLen
GetErrorInfo
GetActiveObject
SysFreeString
VariantClear
SafeArrayPtrOfIndex
VariantChangeType
SysAllocStringLen
SysAllocStringByteLen
Sections
.text Size: 239KB - Virtual size: 238KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 670KB - Virtual size: 670KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ