Static task
static1
Behavioral task
behavioral1
Sample
8c09c95918ffd7251087ee476da2455ed90cfca4084020fe6d1cd63b5e4292c0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8c09c95918ffd7251087ee476da2455ed90cfca4084020fe6d1cd63b5e4292c0.exe
Resource
win10v2004-20221111-en
General
-
Target
8c09c95918ffd7251087ee476da2455ed90cfca4084020fe6d1cd63b5e4292c0
-
Size
171KB
-
MD5
9d09325bacc84e59b62f14fb7d559367
-
SHA1
496f8d0e65224cbfe8631aa4acacfe94a83171d1
-
SHA256
8c09c95918ffd7251087ee476da2455ed90cfca4084020fe6d1cd63b5e4292c0
-
SHA512
06521af92f234f7e0391f4776d86145fadefe645fb1980ec8bbb00aa5e6aab51f0e35fc2ac19c737872ff99fb036469e536b2f304ee5ed3b27468ea108b4541c
-
SSDEEP
1536:RPmOvnsO1dXnWDPDQWfter47SYXwqPYp2e3rQXUmnKu42a1EauJU:DZ1dXnWPMae47uCYQq8XUmnb4TyJU
Malware Config
Signatures
Files
-
8c09c95918ffd7251087ee476da2455ed90cfca4084020fe6d1cd63b5e4292c0.exe windows x86
9e43913aa0ebe1a2b3bff7f022019716
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadStringA
FillRect
PostMessageW
EndDialog
SetWindowPos
GetDlgItem
DestroyIcon
LoadImageW
GetFocus
LoadStringA
LoadStringW
LoadStringW
MessageBeep
IsDlgButtonChecked
GetDC
PostQuitMessage
IsDlgButtonChecked
GetDlgItem
wsprintfA
ScreenToClient
SetWindowLongW
GetFocus
CallWindowProcW
PostMessageW
EnableMenuItem
SendMessageA
CharNextW
GetDlgCtrlID
DefWindowProcW
SetRect
DrawTextW
GetWindow
FillRect
GetDlgItemTextW
DialogBoxParamW
GetWindow
ScreenToClient
LoadStringW
KillTimer
MapWindowPoints
SetCapture
UpdateWindow
GetDlgItemTextW
SetWindowPos
SetDlgItemTextW
GetDlgItemTextW
wsprintfA
BeginPaint
SetWindowTextW
GetSysColor
GetWindowLongW
SystemParametersInfoW
DispatchMessageW
GetDlgItem
MessageBoxW
MapWindowPoints
DialogBoxParamW
GetClientRect
PtInRect
MessageBoxA
LoadStringA
wsprintfA
RegisterClassW
ReleaseDC
DefWindowProcW
GetDlgItem
GetCursorPos
DialogBoxParamW
kernel32
GetCurrentThreadId
SetLastError
InterlockedIncrement
InterlockedDecrement
ReadFile
LoadLibraryA
WideCharToMultiByte
GetCommandLineA
LoadLibraryW
lstrlenW
LoadLibraryW
GetCommandLineA
GetVersionExA
GetCurrentProcessId
Sections
Size: 143KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�vmp0 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
�reloc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE