Static task
static1
Behavioral task
behavioral1
Sample
8e32a046bbc9af2f98f4acc597436da05ff676795f43678d84c36030727adea3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8e32a046bbc9af2f98f4acc597436da05ff676795f43678d84c36030727adea3.exe
Resource
win10v2004-20221111-en
General
-
Target
8e32a046bbc9af2f98f4acc597436da05ff676795f43678d84c36030727adea3
-
Size
604KB
-
MD5
3bfbf66c7a3fd0ea6940ce99a7a4dbf0
-
SHA1
46febf190c78b5317d2daa12eb733cc32c7b7a50
-
SHA256
8e32a046bbc9af2f98f4acc597436da05ff676795f43678d84c36030727adea3
-
SHA512
0c50a5943db0e946cc1dc7bbe58c9a98404a85d547a1d4990cc8e72fde0f85c8f0a2d41485fd08b37f26ceb831fc46289ec759944ac3f79e70d0de8e12dc9bf6
-
SSDEEP
12288:pQyS5syS5Z5Z5Z5syC+G5Z5Z5syS5Z5Z5syS5Z5syC+0:H2KYeSe
Malware Config
Signatures
Files
-
8e32a046bbc9af2f98f4acc597436da05ff676795f43678d84c36030727adea3.exe windows x86
ac70cd8445451f03b5d9263bc48db89a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DestroyIcon
wvsprintfW
ActivateKeyboardLayout
ToUnicodeEx
UnloadKeyboardLayout
GetWindow
IsZoomed
UnhookWindowsHook
kernel32
SystemTimeToTzSpecificLocalTime
VirtualProtect
GetLastError
GetComputerNameExA
gdi32
ExtSelectClipRgn
FONTOBJ_pfdg
PolyBezierTo
AddFontResourceExW
GetTextAlign
comdlg32
GetSaveFileNameA
CommDlgExtendedError
PrintDlgA
GetOpenFileNameA
PageSetupDlgW
FindTextA
Sections
.text Size: 4KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE