?jz__mbc__DZ_wy@@PTPAXD@Z
Static task
static1
Behavioral task
behavioral1
Sample
89ce00b7e701c7b573abd05040f7c9a737dae3281244cbd34049ce9efb507293.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
89ce00b7e701c7b573abd05040f7c9a737dae3281244cbd34049ce9efb507293.exe
Resource
win10v2004-20220901-en
General
-
Target
89ce00b7e701c7b573abd05040f7c9a737dae3281244cbd34049ce9efb507293
-
Size
142KB
-
MD5
86706b3458e598f8505b1ccd0485b93d
-
SHA1
d8d16f3ecb7af636df1da4f8f744c3669a538934
-
SHA256
89ce00b7e701c7b573abd05040f7c9a737dae3281244cbd34049ce9efb507293
-
SHA512
2850041268bac2d697eee522287846e2616fe0395e1cadd53b473396de9d7bd525583565f85d9f85098602e207890df15feb6f2f4c5bc29b051e3b89611ae559
-
SSDEEP
3072:1bAvcL38E9DGZK2milx0ijDvhSrEGp8auIQm4wmBO5FEKlyMs:1bAvcz96K2milii3cQDauIQZ/FZp
Malware Config
Signatures
Files
-
89ce00b7e701c7b573abd05040f7c9a737dae3281244cbd34049ce9efb507293.exe windows x86
238e67fa3324455a2ab17071f18f541f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
PropertySheetA
ImageList_AddMasked
CreatePropertySheetPageA
ImageList_Destroy
user32
VkKeyScanA
SetCursorPos
CharUpperBuffA
TileWindows
OpenIcon
DrawFocusRect
GetUpdateRgn
GetUserObjectInformationW
CharPrevA
CopyRect
DestroyCaret
DrawEdge
MapDialogRect
DragObject
LoadMenuA
CharLowerA
EndDialog
GetSubMenu
CreateDialogParamA
GetWindowTextLengthW
IsCharAlphaA
SetWindowTextA
GetDialogBaseUnits
IsWindowEnabled
RegisterHotKey
AttachThreadInput
InSendMessage
ClipCursor
gdi32
BeginPath
GetTextExtentPointA
GetTextMetricsW
CreatePolygonRgn
RectVisible
GetTextColor
PolyBezier
GetMapMode
SelectObject
CreateSolidBrush
WidenPath
PtInRegion
msvcrt
exit
shlwapi
StrTrimA
StrStrIA
kernel32
HeapAlloc
SetFilePointer
IsBadStringPtrW
GlobalReAlloc
SetCurrentDirectoryW
FindClose
GlobalCompact
GetFileAttributesA
GetProcessHeap
ConvertDefaultLocale
GetACP
IsBadWritePtr
EscapeCommFunction
WaitForMultipleObjectsEx
GetTickCount
GetModuleFileNameA
FormatMessageA
GlobalMemoryStatusEx
GetModuleHandleA
Exports
Exports
Sections
.text Size: 130KB - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 159B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.$debug Size: 512B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data1 Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data2 Size: 512B - Virtual size: 484B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data3 Size: 1024B - Virtual size: 581B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data4 Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ