Static task
static1
Behavioral task
behavioral1
Sample
8a4d0b5f6d9db0ab7285da1f6a3210397a144240957e75375340e4096abb2ee8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8a4d0b5f6d9db0ab7285da1f6a3210397a144240957e75375340e4096abb2ee8.exe
Resource
win10v2004-20220812-en
General
-
Target
8a4d0b5f6d9db0ab7285da1f6a3210397a144240957e75375340e4096abb2ee8
-
Size
335KB
-
MD5
f3ce0505364c89fe77cff8f6375bd7e2
-
SHA1
37f2ce5fc297581ee6856a92580f3b0c3c79427f
-
SHA256
8a4d0b5f6d9db0ab7285da1f6a3210397a144240957e75375340e4096abb2ee8
-
SHA512
91b071b6a9fb47702fd3361eece2a44eeca7563dd31084990134ce99ee15db904a0b1c3125424c8ae8cb4884e6b2d8526e5a28d849a73ad987a64a3b4b4b94ed
-
SSDEEP
6144:C1IyZNOs+yoH1rA1dgt438wRVQBrkoSvvr1p/52HUClAtPPK+:8ImQMYA1dgtpwR+4oSvvB320JtPPK+
Malware Config
Signatures
Files
-
8a4d0b5f6d9db0ab7285da1f6a3210397a144240957e75375340e4096abb2ee8.exe windows x86
22a1698c8d2ed080074b237f4d58fee9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetWindowTextA
MessageBoxA
GetActiveWindow
GetWindowThreadProcessId
IsCharAlphaA
EnumWindows
GetThreadDesktop
SetDlgItemTextA
EnumDisplaySettingsA
DialogBoxParamA
ole32
CoGetCallerTID
comctl32
InitCommonControlsEx
advapi32
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
kernel32
IsBadReadPtr
HeapFree
SetFileAttributesA
GetTickCount
IsValidLanguageGroup
LocalFree
GetTimeFormatA
IsValidLocale
GetStartupInfoA
GetLocalTime
GetDateFormatA
LocalAlloc
LoadLibraryA
FreeLibrary
GetProcAddress
DeleteCriticalSection
InitializeCriticalSection
HeapAlloc
ExitProcess
HeapCreate
Sections
.text Size: 323KB - Virtual size: 323KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ