mitfhlokb
mmoekexspqx
ttngjrpbrdc
Static task
static1
Behavioral task
behavioral1
Sample
ba717b0768bc8c97577b4802809b56ec2089cb22d03ab29d9823edf734fd6727.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ba717b0768bc8c97577b4802809b56ec2089cb22d03ab29d9823edf734fd6727.exe
Resource
win10v2004-20221111-en
Target
ba717b0768bc8c97577b4802809b56ec2089cb22d03ab29d9823edf734fd6727
Size
121KB
MD5
00985e9db18a6046bf9f55ec072c9181
SHA1
978cd65b09003831c4b320a131465605852e1385
SHA256
ba717b0768bc8c97577b4802809b56ec2089cb22d03ab29d9823edf734fd6727
SHA512
ababe193e928e7932427c7c8d5e03447a25cf1d36f4aad0b6361189ebcb9deb1fe9be3b32e4a245054ee705181565a1db71683a50fe8fb4e300d6deaf766ea12
SSDEEP
1536:xbCI32Gy9P4tjdoWG99cpIv617XgrApAL32xFgHZiMMhN4PaLUEigac5DhtuA:x+s2D9uohWIv6V0L32rgfMwEPacNhtuA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VirtualAlloc
HeapAlloc
GetProcessHeap
GetCurrentProcess
LoadLibraryA
IsBadReadPtr
TerminateProcess
GetProcAddress
AssignProcessToJobObject
GetDateFormatA
GetStringTypeW
lstrcmpiA
SizeofResource
CallMsgFilter
GetAsyncKeyState
RedrawWindow
AnimateWindow
CreateCompatibleDC
BitBlt
GetTextCharsetInfo
IsWellKnownSid
GetUserNameW
mitfhlokb
mmoekexspqx
ttngjrpbrdc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ