Static task
static1
Behavioral task
behavioral1
Sample
1435b54c208083be54f70c61af7dfd73cb67ff0782e0e45d2c30269c953d471e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1435b54c208083be54f70c61af7dfd73cb67ff0782e0e45d2c30269c953d471e.exe
Resource
win10v2004-20220812-en
General
-
Target
1435b54c208083be54f70c61af7dfd73cb67ff0782e0e45d2c30269c953d471e
-
Size
83KB
-
MD5
6ff2542442da07373f4a5efa3629fca7
-
SHA1
83bd26b487997a3e5608775625d2a61502196dbe
-
SHA256
1435b54c208083be54f70c61af7dfd73cb67ff0782e0e45d2c30269c953d471e
-
SHA512
985700ce6c2c7dcb18affd01d0b8c684f3e4e29b866ccb8197573f598f60188e2c08dcc6b3d575f3e98ad8d36fcdd6442363e451ed12f8d3bef694d338763714
-
SSDEEP
1536:FhpcEgZFZiK+2MgcQPV29phy7H7Ax4cpIp77Eg2f8Pu/Ofy4I:kP4KDMzQPVcUc63p7AIQ
Malware Config
Signatures
Files
-
1435b54c208083be54f70c61af7dfd73cb67ff0782e0e45d2c30269c953d471e.exe windows x86
51c624ab37c565a93937586c39621b7e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
UnhookWindowsHookEx
GetSysColor
EqualRect
EnumWindows
PostQuitMessage
EnableMenuItem
SetWindowPos
SetWindowTextA
FrameRect
GetScrollPos
GetMessageA
GetSysColorBrush
GetSubMenu
kernel32
SetUnhandledExceptionFilter
GetStartupInfoA
InterlockedExchange
GetTickCount
GetTimeZoneInformation
FileTimeToSystemTime
ExitProcess
GetFileAttributesA
VirtualAllocEx
GetCurrentProcessId
GetThreadLocale
QueryPerformanceCounter
GetTempPathA
GetSystemTime
RtlUnwind
GetOEMCP
GetACP
gdi32
DPtoLP
CopyEnhMetaFileA
CreateICW
SetViewportExtEx
ExcludeClipRect
CreateCompatibleBitmap
SelectClipPath
GetMapMode
FillRgn
ole32
OleRun
CoInitializeSecurity
StgOpenStorage
CoInitialize
CoCreateInstance
StringFromGUID2
CoRevokeClassObject
DoDragDrop
CoTaskMemRealloc
advapi32
RegQueryValueExW
GetSecurityDescriptorDacl
RegCreateKeyA
CheckTokenMembership
RegCreateKeyExW
GetUserNameA
FreeSid
CryptHashData
QueryServiceStatus
AdjustTokenPrivileges
msvcrt
_strdup
puts
iswspace
strlen
fprintf
raise
strcspn
_mbscmp
fflush
__getmainargs
__initenv
strncpy
_fdopen
_flsbuf
__setusermatherr
_lock
_CIpow
signal
comctl32
ImageList_LoadImageA
ImageList_DrawEx
ImageList_SetIconSize
ImageList_GetBkColor
CreatePropertySheetPageA
ImageList_GetIconSize
ImageList_DragEnter
ImageList_LoadImageW
InitCommonControls
ImageList_GetIcon
ImageList_Destroy
ImageList_Write
ImageList_ReplaceIcon
shell32
DragAcceptFiles
DragQueryFileA
DoEnvironmentSubstW
ExtractIconW
ShellExecuteW
SHBrowseForFolderA
DragQueryFileW
ShellExecuteEx
CommandLineToArgvW
SHGetPathFromIDList
ExtractIconExW
oleaut32
SafeArrayUnaccessData
VariantCopy
SafeArrayCreate
SafeArrayGetUBound
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayRedim
SysReAllocStringLen
Sections
.text Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE