Static task
static1
Behavioral task
behavioral1
Sample
89a51d7eca412917d7700d72bdffddeba4d5da9d31eebae859688a6b637ab6fa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
89a51d7eca412917d7700d72bdffddeba4d5da9d31eebae859688a6b637ab6fa.exe
Resource
win10v2004-20220812-en
General
-
Target
89a51d7eca412917d7700d72bdffddeba4d5da9d31eebae859688a6b637ab6fa
-
Size
83KB
-
MD5
50d259cf82735c09ed79d2cdb5007716
-
SHA1
e26695153d9c3852667b2d160ad3272295ed1e7e
-
SHA256
89a51d7eca412917d7700d72bdffddeba4d5da9d31eebae859688a6b637ab6fa
-
SHA512
4ae593de0c93727f64eaaeb0bc7c8b1879d3248ae0106d362c7467ce9bcf2af5d219b33d50631660f6df1886dede0a478e05ef51448e064a2cab5144348328ff
-
SSDEEP
1536:62/92ujfq3+4JuHrZavkXtWJWfswk8AhRzbjx9vhC53FouLPLZyI7nDj/AWk3:62/kujfq3NSav2tRwzvz598RFZXZyI7g
Malware Config
Signatures
Files
-
89a51d7eca412917d7700d72bdffddeba4d5da9d31eebae859688a6b637ab6fa.exe windows x86
d4a0a3f75a5dacaa3b665d56c8ff7bc6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
GetScrollPos
GetMessageA
EnableMenuItem
FrameRect
EnumWindows
PostQuitMessage
SetWindowPos
EqualRect
SetWindowTextA
GetSubMenu
GetSysColor
GetSysColorBrush
UnhookWindowsHookEx
kernel32
GetThreadLocale
GetCurrentProcessId
VirtualAllocEx
InterlockedExchange
GetFileAttributesA
GetTempPathA
GetSystemTime
SetUnhandledExceptionFilter
GetACP
QueryPerformanceCounter
GetTickCount
RtlUnwind
GetOEMCP
FileTimeToSystemTime
GetStartupInfoA
GetTimeZoneInformation
ExitProcess
gdi32
GetMapMode
FillRgn
SelectClipPath
SetViewportExtEx
CreateICW
ExcludeClipRect
DPtoLP
CopyEnhMetaFileA
CreateCompatibleBitmap
ole32
CoRevokeClassObject
StgOpenStorage
CoInitialize
CoTaskMemRealloc
DoDragDrop
CoInitializeSecurity
CoCreateInstance
OleRun
StringFromGUID2
advapi32
RegCreateKeyExW
CheckTokenMembership
GetSecurityDescriptorDacl
RegCreateKeyA
AdjustTokenPrivileges
QueryServiceStatus
RegQueryValueExW
CryptHashData
GetUserNameA
FreeSid
msvcrt
_fdopen
_strdup
fflush
_lock
_CIpow
signal
__initenv
_flsbuf
iswspace
fprintf
_mbscmp
__setusermatherr
puts
strcspn
strlen
__getmainargs
strncpy
raise
comctl32
ImageList_GetIcon
ImageList_LoadImageW
InitCommonControls
ImageList_GetIconSize
ImageList_LoadImageA
ImageList_Write
ImageList_DragEnter
ImageList_Destroy
CreatePropertySheetPageA
ImageList_ReplaceIcon
ImageList_DrawEx
ImageList_GetBkColor
ImageList_SetIconSize
shell32
DragAcceptFiles
SHBrowseForFolderA
ExtractIconExW
DragQueryFileW
DoEnvironmentSubstW
CommandLineToArgvW
DragQueryFileA
ExtractIconW
SHGetPathFromIDList
ShellExecuteW
ShellExecuteEx
oleaut32
SafeArrayPtrOfIndex
VariantCopy
SafeArrayCreate
SafeArrayPutElement
SysReAllocStringLen
SafeArrayRedim
SafeArrayGetUBound
SafeArrayUnaccessData
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 216KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE