Static task
static1
Behavioral task
behavioral1
Sample
af65e39ad361d685781a1b44cbed63758066372e18d71cb74948d5d0dedbe9e1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
af65e39ad361d685781a1b44cbed63758066372e18d71cb74948d5d0dedbe9e1.exe
Resource
win10v2004-20220812-en
General
-
Target
af65e39ad361d685781a1b44cbed63758066372e18d71cb74948d5d0dedbe9e1
-
Size
166KB
-
MD5
ce7682cbc85c25e7531459fc7e938052
-
SHA1
b2465d42282a97b79d95a333b48d0267448fc839
-
SHA256
af65e39ad361d685781a1b44cbed63758066372e18d71cb74948d5d0dedbe9e1
-
SHA512
52ab3a7b98b85d0f3c2a8953a825efb1d841c520abda7c0fa16d81ddf36d5298129c6a8999bd0b2a1a9e302949a1797a5ddc47d0926f45b5c58df4e2e8cf477f
-
SSDEEP
3072:GSJACOcHZucJ2RzRbWpJMG9I6K9A1nxYelrjBeaThB7vJl4JY:3dOc5ucgzRbWXvUeFwaX/4C
Malware Config
Signatures
Files
-
af65e39ad361d685781a1b44cbed63758066372e18d71cb74948d5d0dedbe9e1.exe windows x86
7b24551a7ba8a4f445b001bb9b19730a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
RedrawWindow
IsCharUpperW
LoadImageA
GetWindowDC
DestroyWindow
GetLastActivePopup
InsertMenuItemW
DrawFrameControl
wsprintfW
shlwapi
ChrCmpIW
UrlEscapeA
msvcrt
_controlfp
_wtoi
__set_app_type
__p__fmode
__p__commode
memset
_amsg_exit
realloc
_initterm
_ismbblead
wcstod
_XcptFilter
_exit
_cexit
atoi
__setusermatherr
__getmainargs
gdi32
CreateDIBSection
GetStockObject
GetTextMetricsA
Polyline
GetBitmapBits
kernel32
lstrlenA
LoadLibraryA
GetShortPathNameW
GetModuleFileNameA
UnmapViewOfFile
SetErrorMode
GetModuleHandleA
GetModuleHandleW
lstrcpyA
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ort Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 137KB - Virtual size: 393KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE