Static task
static1
Behavioral task
behavioral1
Sample
1f4bca23f86bf6e5cd0d6c098d776e0cb583b31bb35c3eb1018ecf5d6a42416a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1f4bca23f86bf6e5cd0d6c098d776e0cb583b31bb35c3eb1018ecf5d6a42416a.exe
Resource
win10v2004-20221111-en
General
-
Target
1f4bca23f86bf6e5cd0d6c098d776e0cb583b31bb35c3eb1018ecf5d6a42416a
-
Size
107KB
-
MD5
c9de0695b1b85f9948bedb252382ecbe
-
SHA1
53c7a70a8b1d42aaba4bc4cfd61baf693244244d
-
SHA256
1f4bca23f86bf6e5cd0d6c098d776e0cb583b31bb35c3eb1018ecf5d6a42416a
-
SHA512
84736774d895668d13934de606bfaf2cb4ba910a20404350715a4e5e58297522700afbf7856ae0d26370719e6033e66352a3043e50567b68300c264a770e5727
-
SSDEEP
1536:MI9/dobBlEbzU85mwYy+cvUqc0OFMjZxuU9CwYkC1l8+GYUU588nJKcBUQ/Pb5gW:MslKz2MLy+mcbujZIuD+r7jJJ/PuX
Malware Config
Signatures
Files
-
1f4bca23f86bf6e5cd0d6c098d776e0cb583b31bb35c3eb1018ecf5d6a42416a.exe windows x86
4e76c13a98676825212493f618beaa1d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
printf
free
__set_app_type
strcmp
strrchr
_initterm
strchr
_XcptFilter
__getmainargs
calloc
_except_handler3
_acmdln
exit
__p__commode
strncpy
__p__fmode
__setusermatherr
_adjust_fdiv
_exit
kernel32
GetProcAddress
VirtualProtectEx
IsDebuggerPresent
GetVersionExW
SetLastError
GetModuleHandleW
LoadLibraryExW
SetHandleCount
IsBadReadPtr
lstrcpyA
comctl32
ImageList_DragEnter
CreatePropertySheetPageA
ImageList_BeginDrag
ImageList_SetDragCursorImage
ImageList_Read
ole32
RegisterDragDrop
CoInitialize
CoTaskMemRealloc
CoUninitialize
oleaut32
SafeArrayGetUBound
VariantClear
SysStringLen
VariantInit
SysAllocStringByteLen
CreateErrorInfo
SetErrorInfo
SafeArrayRedim
user32
GetSystemMetrics
SetWindowPlacement
GetSystemMenu
GetMenuItemID
KillTimer
ShowOwnedPopups
PtInRect
GetWindowPlacement
gdi32
PlayMetaFile
EndPage
CreateDCW
CreateEllipticRgn
DeleteObject
advapi32
FreeSid
RegSetValueExW
SetSecurityDescriptorGroup
RegQueryInfoKeyW
shell32
SHGetSpecialFolderPathW
DragAcceptFiles
SHGetSpecialFolderLocation
SHCreateDirectoryExA
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 38KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ