Static task
static1
Behavioral task
behavioral1
Sample
86a7864e023a04ef2833c96b0e9bca20b7fc8b47242b9cfd8931e85e02e6fea9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
86a7864e023a04ef2833c96b0e9bca20b7fc8b47242b9cfd8931e85e02e6fea9.exe
Resource
win10v2004-20220812-en
General
-
Target
86a7864e023a04ef2833c96b0e9bca20b7fc8b47242b9cfd8931e85e02e6fea9
-
Size
288KB
-
MD5
6ddb9a9b2ccc413ec0dcf3b937914ec0
-
SHA1
2dcc4cbf4f5323f185cd3919925e67df816c9166
-
SHA256
86a7864e023a04ef2833c96b0e9bca20b7fc8b47242b9cfd8931e85e02e6fea9
-
SHA512
dbbfeaf1d45e8d5b9fcf6b51e5dba73434bc636a6e66a460a08e35a68ce4bd2c38832789ca6c2739c8840c9b1783426f95847801bfbe12715782b4986a5d2181
-
SSDEEP
6144:s4AKZXYt/RcZiw2D00M18NL8X+FHX5djy:XAKZItpcZiNDrMWLc+FHX5dj
Malware Config
Signatures
Files
-
86a7864e023a04ef2833c96b0e9bca20b7fc8b47242b9cfd8931e85e02e6fea9.exe windows x86
4450c2b21d10e2b50ef492ebada3b71e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetFocus
RegisterClassExA
GetKeyNameTextA
GetWindowTextLengthA
GetClassInfoExA
CallWindowProcA
GetWindowLongA
GetCursorPos
GetFocus
AppendMenuA
FillRect
TrackPopupMenu
DrawFrameControl
PostMessageA
IsDialogMessageA
GetActiveWindow
GetMessageA
CloseClipboard
EndDialog
OffsetRect
LoadIconA
WindowFromPoint
ClientToScreen
FrameRect
SystemParametersInfoA
ScreenToClient
gdi32
CreateSolidBrush
GetBkColor
SetBkMode
MoveToEx
LineTo
ExcludeClipRect
CreatePatternBrush
kernel32
LCMapStringA
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
VirtualProtect
InitializeCriticalSection
CreateFileA
VirtualQuery
LCMapStringW
FlushFileBuffers
SetStdHandle
HeapReAlloc
VirtualAlloc
GetOEMCP
GetACP
RtlUnwind
SetEndOfFile
HeapSize
InterlockedExchange
TlsFree
GetCurrentThread
DuplicateHandle
PeekNamedPipe
GetEnvironmentVariableA
ResetEvent
FindFirstChangeNotificationA
DeleteFileA
OpenMutexA
CreateMutexA
DeviceIoControl
WaitForSingleObject
LoadLibraryA
ExitProcess
GetCurrentProcessId
GetModuleFileNameA
CreateProcessA
GetProfileStringW
AddConsoleAliasA
GetSystemInfo
GetVolumeInformationA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
TlsAlloc
SetLastError
GetCurrentThreadId
GetLastError
TlsSetValue
TlsGetValue
GetProcAddress
HeapFree
CloseHandle
EnterCriticalSection
LeaveCriticalSection
ReadFile
SetFilePointer
HeapAlloc
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
GetCPInfo
GetLocaleInfoA
Sections
.text Size: 96KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 423KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ