Static task
static1
Behavioral task
behavioral1
Sample
8e570f24acece8b0ab5616822e0850999b489916cf11e707414c8f09797147f7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8e570f24acece8b0ab5616822e0850999b489916cf11e707414c8f09797147f7.exe
Resource
win10v2004-20221111-en
General
-
Target
8e570f24acece8b0ab5616822e0850999b489916cf11e707414c8f09797147f7
-
Size
97KB
-
MD5
272ff794b6aa9477316853d1b43e7898
-
SHA1
bc08f483dce72ff1cb09acb4af01b717f3cb9845
-
SHA256
8e570f24acece8b0ab5616822e0850999b489916cf11e707414c8f09797147f7
-
SHA512
f1c24380a87e0cc3dedace999b6c3dda9c79b51de2cd5f5bd2da5f1a9fcd00cd77da8e41b8b9931caff4cbfeb61a9812e1653f3042788efe040dbd861c27701d
-
SSDEEP
1536:yQXfGxKjqArOgFm7BYUfng9fMGQkINB1Eq:PXO2qwWZnkfIkIWq
Malware Config
Signatures
Files
-
8e570f24acece8b0ab5616822e0850999b489916cf11e707414c8f09797147f7.exe windows x86
c01572d51fa86de194366162e0b61dbd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceW
EnumSystemLocalesA
GetProcAddress
DeleteCriticalSection
GetCommandLineW
IsValidLocale
GetModuleFileNameA
VirtualAlloc
LoadLibraryA
GetTimeZoneInformation
GetVersionExW
WaitForSingleObject
LocalFree
user32
PostMessageW
GetKeyState
GetScrollPos
CallWindowProcW
mouse_event
CreateWindowExW
DispatchMessageA
GetMessageA
GetClientRect
GetDlgItemInt
UpdateWindow
TranslateMessage
GetMenuItemID
GetDlgItem
DeferWindowPos
DestroyAcceleratorTable
EnableMenuItem
TrackPopupMenu
gdi32
GetStockObject
CreatePatternBrush
PatBlt
OffsetWindowOrgEx
DeleteObject
SelectObject
CreateFontW
SetBkColor
MoveToEx
CreateFontIndirectW
ExtTextOutW
DeleteDC
Rectangle
CreateCompatibleDC
RestoreDC
CreateHatchBrush
comdlg32
ChooseColorW
PrintDlgW
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegQueryValueExW
RegDeleteValueW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
IsTextUnicode
RegOpenKeyExW
RegCreateKeyExW
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pvkijln Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE