?SDOisioKJS@@YGKEPA_WG@Z
Static task
static1
Behavioral task
behavioral1
Sample
879280774cc5adf385070e061eca07e285ade64d8362f8286b205f4efc918172.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
879280774cc5adf385070e061eca07e285ade64d8362f8286b205f4efc918172.exe
Resource
win10v2004-20220812-en
General
-
Target
879280774cc5adf385070e061eca07e285ade64d8362f8286b205f4efc918172
-
Size
120KB
-
MD5
9086725de9b5dd219638629c2a19a980
-
SHA1
e0864644df1f3a35e58c15e0a2642a795f18785d
-
SHA256
879280774cc5adf385070e061eca07e285ade64d8362f8286b205f4efc918172
-
SHA512
6271090143538e84fe6ee8a36b3e6405d43e31efc051073ba9966d7846a24e67e205f7feb23295147a80a844d93b61b0a0131b9efea336cb0207d6136cf8ea53
-
SSDEEP
3072:kFeGeYiinBSGqd8CQJ1pd3VRGMapRzje+06rnEVNeOjegu:kBLsGA8CQrr3VRGMARzje+0MnV
Malware Config
Signatures
Files
-
879280774cc5adf385070e061eca07e285ade64d8362f8286b205f4efc918172.exe windows x86
fd692d520ee2f0ff178407bc4c469928
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
OleIsRunning
kernel32
UnlockFile
LocalReAlloc
FileTimeToDosDateTime
FoldStringW
CloseHandle
ClearCommError
ResetEvent
LeaveCriticalSection
CreateSemaphoreA
LoadLibraryA
VirtualAlloc
GetFullPathNameW
GetSystemDefaultLangID
VirtualProtect
GlobalGetAtomNameW
SetSystemTime
CreateThread
msvcrt
memcpy
gdi32
ExtFloodFill
GetWindowOrgEx
GetClipBox
SetPixel
PathToRegion
GetTextExtentPointA
GetObjectA
OffsetRgn
ResizePalette
GetNearestColor
GetTextMetricsA
GetBkMode
SetViewportExtEx
RealizePalette
RestoreDC
GetTextExtentPoint32W
SetPaletteEntries
version
VerQueryValueW
user32
LoadStringW
DrawStateA
GetWindowRect
DefDlgProcA
CharNextA
CreateCursor
GetDlgItemTextA
GetWindow
CharNextExA
SetForegroundWindow
SystemParametersInfoW
IsWindow
IsWindowVisible
BeginPaint
GetDialogBaseUnits
SendMessageW
SetWindowLongW
GetClassInfoW
GetAltTabInfoW
OpenInputDesktop
SendInput
EnumThreadWindows
SetRect
InsertMenuW
ShowWindowAsync
CharUpperBuffW
GetScrollInfo
LoadIconA
RemovePropW
CharLowerW
DrawTextW
GetScrollRange
EnumChildWindows
DeferWindowPos
RegisterWindowMessageW
CharUpperBuffA
FindWindowExA
Exports
Exports
Sections
.text Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.dat_0 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_1 Size: 512B - Virtual size: 283B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dat_2 Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_3 Size: 1024B - Virtual size: 662B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_4 Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 320B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.debug Size: 512B - Virtual size: 106B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ