Static task
static1
Behavioral task
behavioral1
Sample
242b5a2a411b654389034e96e0907a7e6a531eb2d1c3a711561c3a51b86945ba.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
242b5a2a411b654389034e96e0907a7e6a531eb2d1c3a711561c3a51b86945ba.exe
Resource
win10v2004-20220901-en
General
-
Target
242b5a2a411b654389034e96e0907a7e6a531eb2d1c3a711561c3a51b86945ba
-
Size
598KB
-
MD5
fed712f05608691dbdfd0a693fb45e4d
-
SHA1
420b2b69b05f387326e456020d43b3efa38e1e97
-
SHA256
242b5a2a411b654389034e96e0907a7e6a531eb2d1c3a711561c3a51b86945ba
-
SHA512
8b2adb6d4ef9f939782edf82c313714a51c64652fa7c03d0392d89cea1ce973a8d5451e62c37bad3b6403434cee853254f48d69317591da0a031526db7000e7a
-
SSDEEP
6144:Tf3nSK1ae5HXQPFfH7d97qPU2sXUtnEPXs8SrTiJHltUnV6F/Q649nv9Eymunv+k:TfCK1aSiFesN6iV7VQ6iiMmt+1hZjV9
Malware Config
Signatures
Files
-
242b5a2a411b654389034e96e0907a7e6a531eb2d1c3a711561c3a51b86945ba.exe windows x86
d5cbbb05a14abe75caf4858c26e13e1f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxA
GetDC
GetClassNameW
KillTimer
CreateDialogIndirectParamW
DispatchMessageW
SetWindowTextW
DrawTextW
GetMessagePos
GetDoubleClickTime
SetForegroundWindow
DeferWindowPos
ClipCursor
GetMenu
MapDialogRect
DrawStateW
EndDialog
WindowFromPoint
UnhookWindowsHookEx
SetCapture
SetParent
DefWindowProcW
kernel32
ActivateActCtx
CreateActCtxA
CreateThread
ExitProcess
GetACP
GetModuleHandleA
GetProcAddress
GetProcessHeap
LoadLibraryA
Sleep
VirtualAlloc
VirtualFree
VirtualProtect
WaitForSingleObject
GetProfileIntW
GetCurrentProcess
lstrcmpA
SetEnvironmentVariableA
GetVersionExA
FreeResource
EnumResourceLanguagesW
gdi32
SetTextColor
GetTextColor
Sections
.text Size: 493KB - Virtual size: 493KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE