Static task
static1
Behavioral task
behavioral1
Sample
5fc71a5049c7539f4f4e7dea164f51abe987cb1205abfbf4d1c04e38dead95fa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5fc71a5049c7539f4f4e7dea164f51abe987cb1205abfbf4d1c04e38dead95fa.exe
Resource
win10v2004-20220812-en
General
-
Target
5fc71a5049c7539f4f4e7dea164f51abe987cb1205abfbf4d1c04e38dead95fa
-
Size
132KB
-
MD5
2ee1f2e5161ab2f2060f4cbb8f5cf166
-
SHA1
37e251bf2014c49d99e8118453b47b956bda4d07
-
SHA256
5fc71a5049c7539f4f4e7dea164f51abe987cb1205abfbf4d1c04e38dead95fa
-
SHA512
fd633561d08831b47c1a24c19b6d378c79507cab36ce2dd37bfa2c94fcb2929610733e61dc92313c181c6acee21a6ccdded7c846a60e9be5584052723b94ab0e
-
SSDEEP
1536:EKPqenI7BSwTmhnLIMGgTppyveVHcJyflLphMt/08N1SJE5W3piiWXDijQ6nHBhq:EKP/n9XXzVHcJyflo1O4jXLbZ3nH
Malware Config
Signatures
Files
-
5fc71a5049c7539f4f4e7dea164f51abe987cb1205abfbf4d1c04e38dead95fa.exe windows x86
12f7511869513fe449ad1e2166adfd21
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetActiveWindow
OemToCharBuffW
VkKeyScanA
GetOpenClipboardWindow
ValidateRect
SetWindowTextA
SetWindowPos
gdi32
GetSystemPaletteUse
ole32
StgIsStorageFile
CreatePointerMoniker
oleaut32
CreateErrorInfo
kernel32
GetConsoleOutputCP
InitAtomTable
HeapDestroy
LocalAlloc
LocalFree
GetNativeSystemInfo
HeapFree
GetProcessTimes
GetCPInfoExA
EnumSystemCodePagesA
HeapCreate
GetCurrentActCtx
GetProcAddress
GetModuleHandleW
Sections
.text Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
SHARED Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ