Static task
static1
Behavioral task
behavioral1
Sample
d9bf7252150e4c8f90e7c585f81e9e70fd802337f8bd879e0813468f6770d80f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d9bf7252150e4c8f90e7c585f81e9e70fd802337f8bd879e0813468f6770d80f.exe
Resource
win10v2004-20220812-en
General
-
Target
d9bf7252150e4c8f90e7c585f81e9e70fd802337f8bd879e0813468f6770d80f
-
Size
85KB
-
MD5
66d579093a0f6308fd17e47111760cd9
-
SHA1
bf3884b4c8ff20c4a2fd18d14608aa703a632877
-
SHA256
d9bf7252150e4c8f90e7c585f81e9e70fd802337f8bd879e0813468f6770d80f
-
SHA512
512a4a6f3bb6273423976349f4b4391b27ee2d228c9386c476b5a52101cf134e538bba86d6b2b8ac4317dd62a25347aa166f812c9fa6f38a5570d28755165276
-
SSDEEP
1536:6y3l+vufjbiNO8zCA5EQK/DhNGlcvVvpEv6YH+V:/+v2jR8zmpDC
Malware Config
Signatures
Files
-
d9bf7252150e4c8f90e7c585f81e9e70fd802337f8bd879e0813468f6770d80f.exe windows x86
62a51d4730b8658ed9e30339e8da05a2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetWindowTextA
SetDlgItemTextA
SendMessageA
MessageBoxA
LoadIconA
LoadBitmapA
IsDlgButtonChecked
GetWindowTextLengthA
GetWindowTextA
GetDlgItem
FindWindowA
EndDialog
DialogBoxParamA
CheckDlgButton
wsprintfA
kernel32
MapViewOfFile
RtlMoveMemory
GetFileSize
lstrlenA
lstrcpyA
lstrcmpA
lstrcatA
WriteFile
VirtualFree
VirtualAlloc
UnmapViewOfFile
SetFilePointer
SetEndOfFile
CloseHandle
CopyFileA
CreateFileA
CreateFileMappingA
CreateThread
DeleteFileA
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
IsBadReadPtr
RtlZeroMemory
comdlg32
GetOpenFileNameA
shell32
ShellExecuteA
DragQueryFileA
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE