Static task
static1
Behavioral task
behavioral1
Sample
86605921d63a265f5f8b3987d0b961caff63ee62fd0528b8a460faa4de95b79f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
86605921d63a265f5f8b3987d0b961caff63ee62fd0528b8a460faa4de95b79f.exe
Resource
win10v2004-20220812-en
General
-
Target
86605921d63a265f5f8b3987d0b961caff63ee62fd0528b8a460faa4de95b79f
-
Size
72KB
-
MD5
8828986e7661ea8bad1b1d98de76a069
-
SHA1
4cb1cf6b31d94e27a62d50b89643c8404eeff1a8
-
SHA256
86605921d63a265f5f8b3987d0b961caff63ee62fd0528b8a460faa4de95b79f
-
SHA512
eea98c8fd4ffae73cf6616ab23beba359f65b31123f8713089aa650587f6316cf57b1bafd4dd9051f52085f5dd123af78c840a29b9d0814d2dd2d84edb1e0c5a
-
SSDEEP
768:T2Vsbn7J9p9wkYy4hNLPStjZGiV8G8by1btUNpSaoxgqC:yqL7jp9DYtvocc8CJqmtC
Malware Config
Signatures
Files
-
86605921d63a265f5f8b3987d0b961caff63ee62fd0528b8a460faa4de95b79f.exe windows x86
95aa5ebb92f3986d62ff35547e7bad27
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
comctl32
CreateToolbarEx
InitCommonControls
PropertySheetA
comdlg32
ChooseColorA
ChooseFontA
CommDlgExtendedError
FindTextA
GetOpenFileNameA
GetSaveFileNameA
PrintDlgA
ReplaceTextA
gdi32
AbortDoc
CreateFontIndirectA
CreateRectRgnIndirect
CreateSolidBrush
DeleteDC
DeleteObject
EndDoc
EndPage
GetDeviceCaps
GetObjectA
GetStockObject
GetTextExtentPoint32A
SelectObject
SetBkColor
SetTextColor
StartDocA
StartPage
kernel32
AddAtomA
CloseHandle
CreateDirectoryA
CreateFileA
ExitProcess
FindAtomA
FindClose
FindFirstFileA
FormatMessageA
FreeLibrary
GetAtomNameA
GetCommandLineA
GetDateFormatA
GetFileSize
GetFullPathNameA
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetStartupInfoA
GetTimeFormatA
GetVersionExA
GlobalAlloc
GlobalFree
LoadLibraryExA
LocalFree
MulDiv
MultiByteToWideChar
ReadFile
SetEndOfFile
SetFilePointer
SetUnhandledExceptionFilter
VirtualAlloc
VirtualFree
WriteFile
WritePrivateProfileStringA
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_access
_cexit
_iob
_itoa
_onexit
_setmode
_stat
abort
atexit
atol
free
malloc
memchr
memset
signal
strchr
strncat
strrchr
shell32
DragAcceptFiles
DragQueryFileA
ShellExecuteA
ShellExecuteExA
Shell_NotifyIconA
shfolder
SHGetFolderPathA
user32
CallWindowProcA
CheckMenuItem
ChildWindowFromPointEx
ClientToScreen
CloseClipboard
CreateWindowExA
DefWindowProcA
DestroyMenu
DestroyWindow
DialogBoxParamA
DispatchMessageA
DrawTextA
EmptyClipboard
EnableMenuItem
EndDialog
FillRect
FindWindowA
FindWindowExA
GetClientRect
GetClipboardData
GetCursorPos
GetDC
GetDlgCtrlID
GetDlgItem
GetDlgItemInt
GetKeyState
GetMenu
GetMenuItemID
GetMessageA
GetParent
GetSubMenu
GetSysColor
GetSysColorBrush
GetUpdateRect
GetWindowPlacement
GetWindowRect
GetWindowTextA
InsertMenuItemA
InvalidateRect
IsDialogMessageA
KillTimer
LoadAcceleratorsA
LoadCursorA
LoadIconA
LoadMenuA
LoadStringA
MessageBeep
MessageBoxA
MoveWindow
OpenClipboard
PostMessageA
PostQuitMessage
RegisterClassA
RegisterWindowMessageA
ReleaseDC
RemoveMenu
ScreenToClient
SendDlgItemMessageA
SendMessageA
SetClipboardData
SetCursor
SetDlgItemInt
SetFocus
SetForegroundWindow
SetMenuItemInfoA
SetScrollPos
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
SystemParametersInfoA
TrackPopupMenu
TranslateAcceleratorA
TranslateMessage
UpdateWindow
ValidateRect
WinHelpA
WindowFromPoint
wsprintfA
Sections
.text Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 272B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE