Static task
static1
Behavioral task
behavioral1
Sample
5dcae411bd471ed76799a7bd2985c2cf1be7e784b5b542036920198993f7a048.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5dcae411bd471ed76799a7bd2985c2cf1be7e784b5b542036920198993f7a048.exe
Resource
win10v2004-20221111-en
General
-
Target
5dcae411bd471ed76799a7bd2985c2cf1be7e784b5b542036920198993f7a048
-
Size
144KB
-
MD5
b53766fef3c3426cfa25618492bb4aa0
-
SHA1
15159926f09d9c145123ed00de62ca2f31783a69
-
SHA256
5dcae411bd471ed76799a7bd2985c2cf1be7e784b5b542036920198993f7a048
-
SHA512
b9d598a1907ea2b54885507d496bbac0512f230666cbbac964268e885bea44c75567ae8bea38fc6bcb4cc1966775045873687c6670c2ec79e3b3eb60c492e645
-
SSDEEP
3072:bkcjvcKADeWX8+QNruZjR7htvHUoColVxEFm6Uof4:7CVX8+QNritviOx1
Malware Config
Signatures
Files
-
5dcae411bd471ed76799a7bd2985c2cf1be7e784b5b542036920198993f7a048.exe windows x86
53d3d48f7dd59f6764fbc1d7ed97366e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateWaitableTimerA
EnumResourceNamesW
_hread
lstrcmpiW
DeleteVolumeMountPointW
GetLocaleInfoW
GetTickCount
UnmapViewOfFile
GetCommTimeouts
GetPrivateProfileStructA
DisconnectNamedPipe
GlobalUnWire
GetModuleHandleW
EnumUILanguagesA
SleepEx
FileTimeToLocalFileTime
GetCurrencyFormatW
FoldStringW
CreateFileA
GetFileSize
ReadFileScatter
FindFirstVolumeW
OpenSemaphoreW
EndUpdateResourceA
FreeUserPhysicalPages
CreateDirectoryExA
LocalReAlloc
GetCalendarInfoW
EnumLanguageGroupLocalesA
GlobalCompact
GlobalDeleteAtom
SetDefaultCommConfigA
GlobalAddAtomW
SetFilePointer
OutputDebugStringW
GetComputerNameExW
ResumeThread
GetFileInformationByHandle
GetStringTypeW
QueryInformationJobObject
SearchPathA
GlobalWire
GetLastError
GetPrivateProfileSectionNamesA
CreateFileW
GetSystemDefaultUILanguage
CreateJobObjectA
user32
ReplyMessage
GetCaretPos
GetDlgItem
CreateIconIndirect
GetDlgCtrlID
SetParent
GetListBoxInfo
ScrollWindow
CharUpperW
DefFrameProcW
ToUnicode
DialogBoxIndirectParamW
LookupIconIdFromDirectory
DestroyMenu
DragObject
DialogBoxIndirectParamA
OemToCharA
SetMenuContextHelpId
DdeGetData
GetComboBoxInfo
SetWinEventHook
EnableScrollBar
ShowWindow
FreeDDElParam
IsCharAlphaNumericA
ScreenToClient
InvalidateRgn
ClientToScreen
SetDebugErrorLevel
GetNextDlgGroupItem
GetCursorInfo
GetQueueStatus
DefDlgProcA
GetMenuContextHelpId
DdeQueryStringW
SendInput
CreateAcceleratorTableA
GetCapture
WinHelpW
LookupIconIdFromDirectoryEx
SetUserObjectSecurity
CharPrevW
LoadBitmapW
DlgDirListA
CheckDlgButton
BroadcastSystemMessageA
GetKeyboardLayoutList
TabbedTextOutW
DdeCreateStringHandleW
IsChild
SendDlgItemMessageA
GetLastInputInfo
MapWindowPoints
SetMenuItemInfoA
DrawAnimatedRects
ShowCaret
DdeKeepStringHandle
GetMessagePos
GetKeyboardLayout
SetCapture
CharLowerA
SendMessageCallbackW
GetMenuItemID
DrawIconEx
shell32
DragQueryPoint
Sections
.text Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 37KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE