Static task
static1
Behavioral task
behavioral1
Sample
2a45aa1df0858ae4df146976d3c51b82fa5f18d4b492ae51a042c8246a7eb51d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2a45aa1df0858ae4df146976d3c51b82fa5f18d4b492ae51a042c8246a7eb51d.exe
Resource
win10v2004-20220812-en
General
-
Target
2a45aa1df0858ae4df146976d3c51b82fa5f18d4b492ae51a042c8246a7eb51d
-
Size
438KB
-
MD5
0ca77e64c7dab6a485f6234e6513bceb
-
SHA1
96ae8131ad27211694545d20cb6a761422a8e4ba
-
SHA256
2a45aa1df0858ae4df146976d3c51b82fa5f18d4b492ae51a042c8246a7eb51d
-
SHA512
f7607d8a2dff864be1925408bd435286d59b0da551d2b7486483cd5c0662479d6b3283beba7f9a5fa3ba9c4579b65958c2541bd44076ac4f2bca1f2dd296c68c
-
SSDEEP
1536:oHnHmJPVxZS8kJITeSp44OGDSnlq2JmOWhGHEhaZks6lRzzbHPD1bPb8DfAJ22pR:om/S8AITYGG+OWh+EhqksoDJJZp
Malware Config
Signatures
Files
-
2a45aa1df0858ae4df146976d3c51b82fa5f18d4b492ae51a042c8246a7eb51d.exe windows x86
ba77d70b625448597471082bb38bf24e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SendMessageA
IsWindow
FindWindowA
GetMenu
GetClassNameA
wsprintfA
GetWindowTextA
CharLowerA
SetForegroundWindow
SetFocus
ShowWindow
VkKeyScanA
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
BlockInput
keybd_event
FindWindowExA
ole32
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
VariantClear
SysFreeString
SysAllocString
VariantInit
msvcrt
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_strcmpi
_controlfp
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
_strlwr
system
fread
_vsnprintf
_iob
_splitpath
strtok
rand
sscanf
atoi
strrchr
strncat
fopen
fgets
fclose
fprintf
_snprintf
malloc
free
strcmp
strstr
memcmp
memcpy
memset
strcat
??2@YAPAXI@Z
__CxxFrameHandler
sprintf
srand
strcpy
strlen
toupper
strncpy
_strdup
strchr
_except_handler3
kernel32
DeleteFileA
GetProcessHeap
GetStartupInfoA
MultiByteToWideChar
CreateMutexA
ExpandEnvironmentStringsA
QueryPerformanceFrequency
QueryPerformanceCounter
GetLocaleInfoA
MoveFileA
lstrcpyA
lstrcmpA
lstrcpynA
RemoveDirectoryA
CreateThread
ReleaseMutex
GetTempPathA
GetWindowsDirectoryA
GetFileTime
SetFileTime
GetFileAttributesA
TerminateThread
GetCurrentThread
GetCurrentProcess
TerminateProcess
OpenProcess
lstrcmpiA
LoadLibraryA
GetVersionExA
GetDateFormatA
GetTimeFormatA
GlobalMemoryStatus
GetSystemDirectoryA
GetDiskFreeSpaceExA
CreateProcessA
WaitForSingleObject
ExitProcess
GetLogicalDriveStringsA
CreateDirectoryA
GetLastError
GetProcAddress
GetDriveTypeA
FindFirstFileA
SetCurrentDirectoryA
GetFullPathNameA
lstrcatA
FindNextFileA
FindClose
CreateFileA
GetFileSize
WriteFile
CloseHandle
SetFilePointer
CreateFileMappingA
MapViewOfFile
lstrlenA
UnmapViewOfFile
GlobalFree
GetModuleHandleA
GetModuleFileNameA
GetVersion
CopyFileA
SetFileAttributesA
InterlockedDecrement
GetTickCount
GlobalAlloc
GlobalLock
GlobalUnlock
Sleep
ExitThread
Sections
.text Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 375KB - Virtual size: 378KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE