Static task
static1
Behavioral task
behavioral1
Sample
1b3b1171489e176cad4e701514410a68a492c6a6f2aeac34a19415fb014f6de9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1b3b1171489e176cad4e701514410a68a492c6a6f2aeac34a19415fb014f6de9.exe
Resource
win10v2004-20221111-en
General
-
Target
1b3b1171489e176cad4e701514410a68a492c6a6f2aeac34a19415fb014f6de9
-
Size
354KB
-
MD5
3fbe49ccb961dd338b5a2afc569834d0
-
SHA1
945367d338eb624944e01459ff5841c9a3ffd0ed
-
SHA256
1b3b1171489e176cad4e701514410a68a492c6a6f2aeac34a19415fb014f6de9
-
SHA512
57cdd59bfe49206ee56b26cab474c05b0c8f933997b55a2555c478543656a1ab5c585564af77daf9f68143c62c7d1ce4f10bbfd5c4e41074cb601271a6a8c768
-
SSDEEP
6144:tCG9QZ5v/hbC5/4In7/Mm/q5i6okpNPY66TmJFV7r1Oc0PmyZ2wrIqIRdtD7GCY6:4GuHvJe5/4U7Ut5i6DRYzTqVtumys6Ib
Malware Config
Signatures
Files
-
1b3b1171489e176cad4e701514410a68a492c6a6f2aeac34a19415fb014f6de9.exe windows x86
4da4e439cd10b8773c5d999b9afd84a6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
IsCharAlphaNumericA
EnumDesktopWindows
IsCharUpperW
SetClassLongA
ValidateRect
SetWindowTextA
GetThreadDesktop
GetActiveWindow
SetWindowRgn
ole32
OleSetClipboard
CoRevokeClassObject
IIDFromString
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
kernel32
LoadResource
HeapDestroy
SetFileAttributesA
LocalAlloc
SizeofResource
HeapCreate
GetThreadContext
GlobalHandle
LocalFree
LoadLibraryA
FindResourceExW
HeapFree
GetStartupInfoA
GetTickCount
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeLibrary
GetProcAddress
Sections
.text Size: 335KB - Virtual size: 335KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ