Static task
static1
Behavioral task
behavioral1
Sample
32e7e6af26c5b1d63f504a147d03fd5327f2e2dc040765bcba8323d17405daee.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
32e7e6af26c5b1d63f504a147d03fd5327f2e2dc040765bcba8323d17405daee.exe
Resource
win10v2004-20221111-en
General
-
Target
32e7e6af26c5b1d63f504a147d03fd5327f2e2dc040765bcba8323d17405daee
-
Size
161KB
-
MD5
9af794651674a51055f62f73cf3d5d57
-
SHA1
3f0d8496dd7e111de09aeaea758ecd58164a1c0b
-
SHA256
32e7e6af26c5b1d63f504a147d03fd5327f2e2dc040765bcba8323d17405daee
-
SHA512
4ac7d9b7b19cb0e9cb08e76e844ef470984c070a9f1af9777972d1c15cd12b8a5305d6332a03cab6ab93a1543aa12a9b0d94e3305b89d6087c04b9ea12e6d346
-
SSDEEP
1536:Y9R1/NG0qaHNhhsP2ynyU28ZZ8zuv1Ex5Zu5/6AIJA5l0BY+qDufcj/YdC3bKO:YHmbEa+ynFh73p6fA7j+qnj/8W2O
Malware Config
Signatures
Files
-
32e7e6af26c5b1d63f504a147d03fd5327f2e2dc040765bcba8323d17405daee.exe windows x86
d1952eb622e9ae26197fe1f094404180
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryW
GetLogicalDriveStringsA
Beep
GetCurrentThread
OpenEventA
GetProcessHeap
GetDiskFreeSpaceW
GetShortPathNameA
user32
GetMenuItemInfoW
GetForegroundWindow
GetScrollPos
RegisterHotKey
gdi32
GetDIBits
GetBitmapBits
SetPixel
CreateBitmap
CreateFontIndirectA
TextOutW
advapi32
RegQueryInfoKeyA
RegCreateKeyExA
comdlg32
PrintDlgExA
ChooseFontW
shell32
Shell_NotifyIconA
ExtractAssociatedIconW
SHBrowseForFolderA
StrChrIW
ShellExecuteW
StrRChrA
ShellExecuteEx
ole32
CoFileTimeNow
OleInitialize
version
VerLanguageNameA
VerFindFileA
VerInstallFileA
GetFileVersionInfoA
Sections
.text Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ