Static task
static1
Behavioral task
behavioral1
Sample
73a57fc3557866dfc21569794aec192b946770682b94e7fb6bf2adc9926b18e5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
73a57fc3557866dfc21569794aec192b946770682b94e7fb6bf2adc9926b18e5.exe
Resource
win10v2004-20220901-en
General
-
Target
73a57fc3557866dfc21569794aec192b946770682b94e7fb6bf2adc9926b18e5
-
Size
372KB
-
MD5
08c957ccf7014a47f582eeb8b5904006
-
SHA1
49b7cb0120e6085ab84bba3e0898be2d483422a6
-
SHA256
73a57fc3557866dfc21569794aec192b946770682b94e7fb6bf2adc9926b18e5
-
SHA512
74f181ff7cd62816042f9d9ba6d112aa5d8f25a2365590fd12e399a312c15286edb34a6d5783472de025392fa6a5b8ad17bfce33c110106e143c460139827210
-
SSDEEP
6144:3z3TPnibDkteY9Fnp7R8emOkqkSYuKNx5VtRbqYHYp21D0Bi9dxdV6seRguyVjPj:3zTimFnp7RAODkCENbCU1ABijxahypb
Malware Config
Signatures
Files
-
73a57fc3557866dfc21569794aec192b946770682b94e7fb6bf2adc9926b18e5.exe windows x86
452a116912c2cba6c86d5c7602e687d7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindAtomA
GlobalUnlock
GlobalFree
LoadLibraryExW
ReleaseMutex
CreateMutexA
CreateFileA
PulseEvent
TlsGetValue
ExitThread
GetEnvironmentVariableA
FindResourceA
GetCurrentProcessId
FindClose
SetLastError
SetConsoleCursorInfo
GetModuleHandleA
HeapCreate
GetACP
CloseHandle
user32
GetFocus
FillRect
CheckRadioButton
DispatchMessageA
GetIconInfo
CopyRect
DrawEdge
GetDlgItem
CallWindowProcA
DrawMenuBar
GetDC
IsWindow
DefWindowProcW
uxtheme
DrawThemeEdge
DrawThemeText
GetThemeSysInt
DrawThemeIcon
GetThemeRect
clbcatq
SetupOpen
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ