Static task
static1
Behavioral task
behavioral1
Sample
94457c1263f0414f697778c8161075a3397064803b13193952a5a8830d75abe2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
94457c1263f0414f697778c8161075a3397064803b13193952a5a8830d75abe2.exe
Resource
win10v2004-20220812-en
General
-
Target
94457c1263f0414f697778c8161075a3397064803b13193952a5a8830d75abe2
-
Size
87KB
-
MD5
617194b86a48edca154dd7ba0d4fe8d8
-
SHA1
0a402b5e8cc1325e26edeb4499b2f1de5233167f
-
SHA256
94457c1263f0414f697778c8161075a3397064803b13193952a5a8830d75abe2
-
SHA512
719eaad6e7ff48dbd034e176fe8104aced0bee5206c6f1f96249c283efb5651fdbc17d1a3dc58cce9db789fd47bfb5f06235939fc6607abcffe38901753b0eb8
-
SSDEEP
1536:ODa4RseuCa0OVeUP2eus7prHdJoHf2HqHsL:OTsYPuPvHdJNyO
Malware Config
Signatures
Files
-
94457c1263f0414f697778c8161075a3397064803b13193952a5a8830d75abe2.exe windows x86
748c73c0b0177e51c06c7785c4c7e09a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetClassLongA
EnumDesktopWindows
IsCharAlphaNumericA
SetWindowTextA
ValidateRect
IsCharUpperW
GetThreadDesktop
GetActiveWindow
SetWindowRgn
ole32
OleSetClipboard
CoRevokeClassObject
IIDFromString
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
kernel32
SetFileAttributesA
HeapDestroy
GlobalHandle
LocalAlloc
LoadResource
HeapCreate
GetStartupInfoA
LocalFree
LoadLibraryA
GetProcAddress
SizeofResource
FindResourceExW
GetThreadContext
GetTickCount
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeLibrary
Sections
.text Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ