?CreateDlgMessage@@YGHPAXPADK|U
Static task
static1
Behavioral task
behavioral1
Sample
97c7aaea5f98f2845cbe0b3f0b4253f6564789aca3e23c0a54f55850eade27f7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
97c7aaea5f98f2845cbe0b3f0b4253f6564789aca3e23c0a54f55850eade27f7.exe
Resource
win10v2004-20220901-en
General
-
Target
97c7aaea5f98f2845cbe0b3f0b4253f6564789aca3e23c0a54f55850eade27f7
-
Size
134KB
-
MD5
131d2c0116c3d9790907580163659539
-
SHA1
8686cfb2425838f5b94b851d88678dcd8aff9e5a
-
SHA256
97c7aaea5f98f2845cbe0b3f0b4253f6564789aca3e23c0a54f55850eade27f7
-
SHA512
a7d2c59bc7d7237051ed0a76a576959cb6ab1d42b563d5388a4b1a2ad82710e4622234ed3b751abd44f1a9fd3ed599e34ea3112308028471a3f47ece8c68d2de
-
SSDEEP
3072:vajtj8untmykwi1d32HSziRSnqdM7d3M8d9/wl:ijSun+wirIR+qLiI
Malware Config
Signatures
Files
-
97c7aaea5f98f2845cbe0b3f0b4253f6564789aca3e23c0a54f55850eade27f7.exe windows x86
6dfd6c35db74b38e1288767ded95fed3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindow
TileWindows
LoadCursorA
DrawTextA
SendMessageTimeoutW
CheckMenuItem
GetDC
DialogBoxIndirectParamW
wsprintfW
CloseDesktop
DeferWindowPos
DialogBoxParamW
EnableMenuItem
MapVirtualKeyExW
GetWindowTextW
GetWindowLongW
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
strstr
_amsg_exit
_initterm
_ismbblead
_XcptFilter
memset
_exit
_cexit
__setusermatherr
__getmainargs
shlwapi
UrlGetLocationW
ChrCmpIW
gdi32
Polyline
EndDoc
GetTextExtentPoint32A
GetTextFaceW
RectVisible
EnumFontFamiliesExW
kernel32
GetModuleFileNameA
GetSystemTimeAdjustment
FlushViewOfFile
ResetEvent
lstrcmpiW
lstrlenA
LoadLibraryExA
GetFileTime
GetLongPathNameW
GetOverlappedResult
LoadLibraryA
Exports
Exports
Sections
.text Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idir Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 104KB - Virtual size: 230KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE