Static task
static1
Behavioral task
behavioral1
Sample
4552a01ea7064532747eca1d1a2646b16d0ee93254d8d0a6c81b6b753b160b60.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4552a01ea7064532747eca1d1a2646b16d0ee93254d8d0a6c81b6b753b160b60.exe
Resource
win10v2004-20220901-en
General
-
Target
4552a01ea7064532747eca1d1a2646b16d0ee93254d8d0a6c81b6b753b160b60
-
Size
158KB
-
MD5
dce3fce60694ee2387f7b51373b2ed30
-
SHA1
6ca68b9fd7b313eb8c0526a5ff67c4e05dec10f5
-
SHA256
4552a01ea7064532747eca1d1a2646b16d0ee93254d8d0a6c81b6b753b160b60
-
SHA512
19de497b85708c81386627f5e0a557f1650b57118c9051e1275c9b78c6d87a416d82e9d2f8a10fe61b4efff1711b4116d6453ee6cb291e90df964f897bae2ba8
-
SSDEEP
3072:YlU6ydqWNy0J2TlQ2jEb94PmszQFGFt6pQHwyPaTyqfG:YWNdlNtsApGtGfQZPaTFO
Malware Config
Signatures
Files
-
4552a01ea7064532747eca1d1a2646b16d0ee93254d8d0a6c81b6b753b160b60.exe windows x86
5dbb476f31b13135c31fef78d2ec8a14
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetTextColor
GetBkColor
GetMapMode
GetTextExtentPoint32W
CreateFontIndirectW
CreateSolidBrush
GetStockObject
CreatePatternBrush
DeleteDC
rpcrt4
RpcStringBindingComposeW
RpcStringFreeW
RpcSmDestroyClientContext
RpcBindingFromStringBindingW
shell32
SHGetFolderPathW
DragQueryFileW
DragFinish
CommandLineToArgvW
SHFileOperationW
user32
wvsprintfA
kernel32
GetTempPathW
SetLastError
WaitForSingleObject
GetFileAttributesA
HeapSetInformation
GlobalFree
DeleteCriticalSection
GetTickCount
MultiByteToWideChar
lstrlenA
GlobalHandle
FormatMessageW
InterlockedDecrement
InterlockedIncrement
CreateFileW
CloseHandle
oleaut32
VariantInit
DispGetIDsOfNames
VarUI4FromDec
SysFreeString
Sections
.text Size: 86KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 302B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ