?CreateEventJUDhfjkldf@@YGKEPA_WG@Z
Static task
static1
Behavioral task
behavioral1
Sample
8560452902bebc341eb73f608951ddd022d530b0b3afa6430010c207746c61b1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8560452902bebc341eb73f608951ddd022d530b0b3afa6430010c207746c61b1.exe
Resource
win10v2004-20220812-en
General
-
Target
8560452902bebc341eb73f608951ddd022d530b0b3afa6430010c207746c61b1
-
Size
218KB
-
MD5
9d6b5a1fe9ab895f066486a60232ba4c
-
SHA1
2199a5edad1408a181e3491a74b6214c1e23d0be
-
SHA256
8560452902bebc341eb73f608951ddd022d530b0b3afa6430010c207746c61b1
-
SHA512
e01cf125fcf5ab84f8eb73ebfd240c4fca3160758c82e4695f350df505efc0631bbe549c98d4ed7eb040c915cd9d07bf01af61c6bb911e847678a7f28bc1c037
-
SSDEEP
6144:FLi5kdfA9LpFQjKlcjcHlVwLdmJyPkdd0B8hA:A+ZAQ7jcHlVwLdP6dSAA
Malware Config
Signatures
Files
-
8560452902bebc341eb73f608951ddd022d530b0b3afa6430010c207746c61b1.exe windows x86
d1cded4cae80f8d8ad905b8f49d2cbf8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MonitorFromRect
GetScrollInfo
GetClassInfoA
LoadMenuW
RegisterClassA
LoadStringA
wsprintfA
IsIconic
InsertMenuItemW
SetDlgItemTextA
CharUpperA
InsertMenuA
CharNextW
GetMenuCheckMarkDimensions
TranslateMessage
SetCaretPos
LoadIconW
DestroyCursor
GetLastActivePopup
ChangeMenuW
LoadAcceleratorsA
SetWindowPos
SetRect
IsCharUpperA
LookupIconIdFromDirectory
SetScrollRange
MapVirtualKeyA
GetWindowTextA
DefDlgProcA
EnableMenuItem
GetWindow
SetActiveWindow
SetWindowLongA
SetUserObjectInformationW
kernel32
GetComputerNameExA
GetHandleInformation
TryEnterCriticalSection
lstrcatW
CreateFileMappingW
DeviceIoControl
GlobalUnlock
GetSystemDirectoryA
lstrcpyW
WaitCommEvent
SetSystemTime
FindNextFileW
DeleteFileW
LeaveCriticalSection
FindResourceA
TlsFree
gdi32
GetNearestPaletteIndex
CreateBitmap
SetDIBits
CreateFontA
GetPaletteEntries
GetTextExtentPointA
LineTo
DeleteObject
GetBitmapBits
TranslateCharsetInfo
CreateDiscardableBitmap
Escape
UnrealizeObject
GetTextCharsetInfo
GetCharWidth32W
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_amsg_exit
mbtowc
_initterm
strncmp
_acmdln
exit
_ismbblead
mbstowcs
localtime
_XcptFilter
_exit
remove
tolower
sprintf
_cexit
wcslen
__setusermatherr
fflush
isxdigit
__getmainargs
comctl32
ImageList_Destroy
CreatePropertySheetPageA
ImageList_Read
ImageList_AddMasked
CreateStatusWindowW
Exports
Exports
Sections
.text Size: 174KB - Virtual size: 173KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idat Size: 512B - Virtual size: 396B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.diag_x Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.div Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.diag_y Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.imul Size: 512B - Virtual size: 198B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.plus Size: 1024B - Virtual size: 530B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.minus Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ