Static task
static1
Behavioral task
behavioral1
Sample
33c3cfc5b150950c1044517c8cbded3276eba52445e1a54741c01b3952359e29.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
33c3cfc5b150950c1044517c8cbded3276eba52445e1a54741c01b3952359e29.exe
Resource
win10v2004-20221111-en
General
-
Target
33c3cfc5b150950c1044517c8cbded3276eba52445e1a54741c01b3952359e29
-
Size
154KB
-
MD5
041e8624f7634474fc06b44333f27f90
-
SHA1
798bfd93722c8c12f1eadc222710cd26015698ef
-
SHA256
33c3cfc5b150950c1044517c8cbded3276eba52445e1a54741c01b3952359e29
-
SHA512
e8fed9992fb27822fb20cd6b0d7a05932853fd17cd077220d6b0ea5364edbc80e9120c1a644cd3c1a02347fcbfa4b0571c2fa03be28ecf791e13381eeed22929
-
SSDEEP
3072:/G+gEfpC46JbsN7mwEbJJa1445ol3S/IS7uiMIcKjRAn:Zx6JbsN7EbrSAGKkc
Malware Config
Signatures
Files
-
33c3cfc5b150950c1044517c8cbded3276eba52445e1a54741c01b3952359e29.exe windows x86
54968207b857becb04fc87cb4aac99ba
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetStockObject
user32
SetWindowLongA
SetWindowTextA
CreateWindowExA
SetForegroundWindow
TranslateMessage
UpdateWindow
SendMessageA
RegisterClassExA
PostQuitMessage
LoadIconA
LoadCursorA
GetWindowTextLengthA
GetWindowTextA
GetSystemMetrics
GetMessageA
GetDlgItem
GetDlgCtrlID
EnableWindow
DispatchMessageA
ShowWindow
DefWindowProcA
CallWindowProcA
SetWindowWord
kernel32
FlushFileBuffers
CreateFileA
CloseHandle
VirtualProtect
Sleep
RtlZeroMemory
LoadLibraryA
GetModuleHandleA
GetLastError
GetCurrentDirectoryA
GetCommandLineA
ExitProcess
CreateThread
WriteFile
comdlg32
GetSaveFileNameA
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 149KB - Virtual size: 149KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE