Static task
static1
Behavioral task
behavioral1
Sample
91a3d50ee5111caf454324505c6139c52aa589762a4287e0a211568357af223a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
91a3d50ee5111caf454324505c6139c52aa589762a4287e0a211568357af223a.exe
Resource
win10v2004-20220901-en
General
-
Target
91a3d50ee5111caf454324505c6139c52aa589762a4287e0a211568357af223a
-
Size
296KB
-
MD5
379bc8951e044e98dc5ad21024959ee0
-
SHA1
45ad8774a786fa1252982e37fdda0d3d3822b05b
-
SHA256
91a3d50ee5111caf454324505c6139c52aa589762a4287e0a211568357af223a
-
SHA512
21bdaa0a5f10f3bbea75138473a9cc0e47a628e8f6654ec2231bfd361c3dfca0606afeced6f49f32f833ff5a37a05c9565f1ad879a3363adca491c2eba3eeb05
-
SSDEEP
3072:7sUMT62/lvMnh1l1U7+vHlw6o3qx5tg6oJ2XfQaOorx4e2vTugfXVTGs6:ZH290n91U7YlHo3tBQIaOorx4eaLt76
Malware Config
Signatures
Files
-
91a3d50ee5111caf454324505c6139c52aa589762a4287e0a211568357af223a.exe windows x86
2a63e12075cbb54f5ceef557375375b6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateThread
WaitForSingleObject
CreateThread
GetComputerNameA
GetProcessHeap
VirtualProtect
VirtualAlloc
SetThreadPriority
GetProcessVersion
GetCommandLineA
HeapAlloc
GetStartupInfoA
GlobalFree
GlobalAlloc
CloseHandle
Sleep
GetCurrentDirectoryA
GetModuleHandleA
LoadLibraryA
GetProcAddress
ExitProcess
ExitThread
HeapFree
HeapReAlloc
VirtualQuery
InterlockedExchange
RtlUnwind
GetCurrentProcess
TerminateProcess
GetModuleFileNameA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
gdi32
SetRectRgn
TextOutA
GetCharWidth32A
SetTextColor
SetBkColor
GetTextExtentPoint32A
GetTextMetricsA
user32
CreateCaret
ReleaseDC
GetDC
GetClientRect
PostQuitMessage
DefWindowProcA
GetDesktopWindow
SetCaretPos
ShowCaret
HideCaret
DestroyCaret
UnregisterHotKey
BeginPaint
DrawTextA
EndPaint
SendMessageA
MessageBeep
GetKeyState
wsprintfA
GetSystemMetrics
MessageBoxA
winmm
timeBeginPeriod
winscard
SCardAccessStartedEvent
Sections
.text Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 204KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.R1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.R2 Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
APK Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
B/A2 Size: 4KB - Virtual size: 256B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
B/A1 Size: 4KB - Virtual size: 768B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
B/A4 Size: 4KB - Virtual size: 256B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 648B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ