Static task
static1
Behavioral task
behavioral1
Sample
3b975ca6a8be8786ef78632bb14040331685135e0968e572f32297f426e9f353.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3b975ca6a8be8786ef78632bb14040331685135e0968e572f32297f426e9f353.exe
Resource
win10v2004-20220812-en
General
-
Target
3b975ca6a8be8786ef78632bb14040331685135e0968e572f32297f426e9f353
-
Size
279KB
-
MD5
aa825550fa50351288643b867ddaddb3
-
SHA1
060ccc9d5faf8042940d9f31298ad98aa8b6e451
-
SHA256
3b975ca6a8be8786ef78632bb14040331685135e0968e572f32297f426e9f353
-
SHA512
02c3b925cd1cc392714481d1fe734c2c168e4e83964c50e44cb9c1254e9fc564d34a13ead010d80845d9e7cd307acd1814fbdc76815bda40e7b8c4cc434fa1a1
-
SSDEEP
6144:gPXwW8ge32hSWG6T/tzA0ETfrGx6NUjiH3pJzXyYgoNaUTe:QAbgzSWrGjrw6NUi3pJrtNase
Malware Config
Signatures
Files
-
3b975ca6a8be8786ef78632bb14040331685135e0968e572f32297f426e9f353.exe windows x86
b4230da04d5ccbbb3ffd1a732e5a0310
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetActiveWindow
EnumDesktopsA
OemKeyScan
SetPropA
IsCharAlphaNumericW
SetWindowTextA
DialogBoxParamA
SetWindowPos
ole32
CoFreeLibrary
CoLoadLibrary
CoAllowSetForegroundWindow
OleFlushClipboard
kernel32
GetSystemTimeAsFileTime
CopyFileW
CreateProcessW
SizeofResource
HeapDestroy
GetStartupInfoA
SetFileAttributesA
AddAtomW
HeapFree
DeleteAtom
GetProcAddress
LoadLibraryA
LocalAlloc
GlobalMemoryStatus
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
LocalFree
HeapCreate
InitializeSListHead
Sections
.text Size: 260KB - Virtual size: 259KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ