Static task
static1
Behavioral task
behavioral1
Sample
26b960681d2d102b784d1a39524790143eef6af6cabb3dd71c44668240e8f085.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
26b960681d2d102b784d1a39524790143eef6af6cabb3dd71c44668240e8f085.exe
Resource
win10v2004-20220812-en
General
-
Target
26b960681d2d102b784d1a39524790143eef6af6cabb3dd71c44668240e8f085
-
Size
123KB
-
MD5
f78669452b8539c6f6187fb29ed7c2aa
-
SHA1
a34d688cdbd23a3b9b210a3d716c4ccdf3368041
-
SHA256
26b960681d2d102b784d1a39524790143eef6af6cabb3dd71c44668240e8f085
-
SHA512
c94050719b3d7e437d985bd2ab07c473d7a686db0e3a5ca8d43f7a36219ad9f634375f4f6c69ed5cf22db1216287dbdc4760f077680b81f889af1ab826e3366b
-
SSDEEP
1536:RDvdyfyxKJrZI8cBTkK8cSX31MOmnUHEx2f8m+CBGmxMAPh2U:RRyKiC8X31dlcGVvh9d
Malware Config
Signatures
Files
-
26b960681d2d102b784d1a39524790143eef6af6cabb3dd71c44668240e8f085.exe windows x86
f278738f2ac5a2b5566b3d790345a387
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SendMessageW
SetActiveWindow
SetWindowPos
SetWindowPlacement
GetWindowLongW
LoadStringW
InvalidateRect
PtInRect
MapWindowPoints
GetMenuState
DialogBoxParamA
SetRect
UpdateWindow
TrackPopupMenu
SetScrollPos
DestroyWindow
GetSystemMetrics
SendDlgItemMessageA
GetForegroundWindow
GetLastActivePopup
GetKeyState
AdjustWindowRectEx
wsprintfA
SetFocus
MessageBoxW
UnionRect
GetMessageW
PostMessageW
GetMenu
TranslateMessage
GetWindowPlacement
InflateRect
GetClassNameW
RegisterClassExW
GetWindow
LoadBitmapW
MsgWaitForMultipleObjects
kernel32
GetCurrentProcessId
GetThreadLocale
DisableThreadLibraryCalls
GetCurrentDirectoryA
SizeofResource
FileTimeToLocalFileTime
SetLastError
GetCurrentProcess
GetLastError
DeleteCriticalSection
FreeEnvironmentStringsA
RemoveDirectoryW
GetCommandLineA
FileTimeToSystemTime
GetOEMCP
LoadLibraryExA
MoveFileExW
RtlUnwind
WriteFile
TlsSetValue
TerminateProcess
IsProcessorFeaturePresent
LoadLibraryA
LCMapStringA
FindNextFileW
RaiseException
lstrcpynA
GetLocaleInfoA
EnterCriticalSection
CreateFileA
HeapDestroy
lstrlenA
GlobalSize
GetVersionExA
ReleaseMutex
GetStringTypeA
ResetEvent
CompareStringA
FreeEnvironmentStringsW
GetModuleFileNameW
LocalAlloc
CreateFileW
SetUnhandledExceptionFilter
InterlockedCompareExchange
HeapSize
FindResourceA
LoadLibraryW
DeleteFileW
CompareStringW
Sleep
GlobalAlloc
HeapFree
GetCommandLineW
GetModuleFileNameA
LeaveCriticalSection
VirtualFree
SetThreadPriority
GetSystemInfo
VirtualProtect
WaitForSingleObject
LoadResource
TlsFree
SetFileAttributesA
CloseHandle
GetProcAddress
GetFileType
HeapCreate
QueryPerformanceCounter
GetTimeFormatA
GetProcessHeap
InterlockedExchange
GetUserDefaultLCID
SetEndOfFile
TlsAlloc
InterlockedDecrement
GetCPInfo
FreeResource
GetTempPathA
HeapReAlloc
GetFileSize
GetVersion
GetEnvironmentStringsW
GetACP
WaitForMultipleObjects
GetDriveTypeA
DeleteFileA
GetSystemTimeAsFileTime
lstrlenW
OutputDebugStringA
GetModuleHandleA
SetFileTime
LockResource
GetFileAttributesA
GetStdHandle
MapViewOfFile
SetFilePointer
OutputDebugStringW
IsDebuggerPresent
GetCurrentThreadId
FindNextFileA
GetTickCount
IsBadCodePtr
FreeLibrary
ExitProcess
CreateFileMappingA
gdi32
GetStockObject
MoveToEx
SetBkColor
SaveDC
SelectObject
BitBlt
ExcludeClipRect
StretchBlt
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 136KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ