Static task
static1
Behavioral task
behavioral1
Sample
869da440178ebe5570485c3d8baf921371a6dc91f190120b21f43fbc3e76c474.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
869da440178ebe5570485c3d8baf921371a6dc91f190120b21f43fbc3e76c474.exe
Resource
win10v2004-20221111-en
General
-
Target
869da440178ebe5570485c3d8baf921371a6dc91f190120b21f43fbc3e76c474
-
Size
81KB
-
MD5
a044616ec695e1c22c912803326a9f17
-
SHA1
92229cabda1056deb61ae5a00983b2f17e46fc84
-
SHA256
869da440178ebe5570485c3d8baf921371a6dc91f190120b21f43fbc3e76c474
-
SHA512
1e7c8300608321e71b1989a2cfb7f70512b1228091cbe0ee3769b9ff0afb1d120d6b620fc70205c96d2cdb85c906fd1752ab0acbddcea3927005066c7b919980
-
SSDEEP
1536:vQiLN2VPvbWl5vFDckjYQ6Rt4MhZ7/BNiIBpboSZ55dIv9hWPDs+JjEgom:vQkUVnbWl5vFwNnROMhZ75N3pbFZ55m2
Malware Config
Signatures
Files
-
869da440178ebe5570485c3d8baf921371a6dc91f190120b21f43fbc3e76c474.exe windows x86
e276dd79d5c16e0fcc2053ccf6ab1f2c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
GetSubMenu
SetWindowTextA
FrameRect
EnableMenuItem
SetWindowPos
GetMessageA
GetSysColorBrush
EnumWindows
PostQuitMessage
GetScrollPos
GetSysColor
EqualRect
UnhookWindowsHookEx
kernel32
GetThreadLocale
GetTempPathA
GetStartupInfoA
GetACP
InterlockedExchange
GetSystemTime
GetCurrentProcessId
GetFileAttributesA
FileTimeToSystemTime
GetOEMCP
VirtualAllocEx
QueryPerformanceCounter
GetTickCount
RtlUnwind
SetUnhandledExceptionFilter
GetTimeZoneInformation
ExitProcess
gdi32
GetMapMode
CreateCompatibleBitmap
CopyEnhMetaFileA
SelectClipPath
SetViewportExtEx
DPtoLP
CreateICW
FillRgn
ExcludeClipRect
ole32
OleRun
CoTaskMemRealloc
DoDragDrop
CoRevokeClassObject
CoCreateInstance
CoInitializeSecurity
CoInitialize
StgOpenStorage
StringFromGUID2
advapi32
AdjustTokenPrivileges
GetSecurityDescriptorDacl
CheckTokenMembership
CryptHashData
FreeSid
QueryServiceStatus
RegCreateKeyA
GetUserNameA
RegCreateKeyExW
RegQueryValueExW
msvcrt
strcspn
puts
_flsbuf
_mbscmp
signal
__initenv
strlen
raise
_lock
_strdup
fflush
strncpy
__getmainargs
__setusermatherr
fprintf
_fdopen
iswspace
_CIpow
comctl32
ImageList_DragEnter
ImageList_ReplaceIcon
ImageList_GetIconSize
ImageList_GetBkColor
ImageList_GetIcon
ImageList_SetIconSize
ImageList_LoadImageW
ImageList_Write
InitCommonControls
CreatePropertySheetPageA
ImageList_DrawEx
ImageList_Destroy
ImageList_LoadImageA
shell32
SHBrowseForFolderA
ExtractIconW
DoEnvironmentSubstW
DragQueryFileA
CommandLineToArgvW
ExtractIconExW
DragAcceptFiles
ShellExecuteW
SHGetPathFromIDList
DragQueryFileW
ShellExecuteEx
oleaut32
SafeArrayUnaccessData
SysReAllocStringLen
VariantCopy
SafeArrayPutElement
SafeArrayPtrOfIndex
SafeArrayCreate
SafeArrayGetUBound
SafeArrayRedim
Sections
.text Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ