?CreateDlgMessage@@YGHPAXPADK|U
Static task
static1
Behavioral task
behavioral1
Sample
764d0d5cf790d8cab566e760a949ba6e4e7e345a88675d902e43959190a5535c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
764d0d5cf790d8cab566e760a949ba6e4e7e345a88675d902e43959190a5535c.exe
Resource
win10v2004-20220812-en
General
-
Target
764d0d5cf790d8cab566e760a949ba6e4e7e345a88675d902e43959190a5535c
-
Size
137KB
-
MD5
9e159ec4bacc7dfaf80e7d8f278caddb
-
SHA1
2af4de57657a7d71b74ff9ee312b663b68034264
-
SHA256
764d0d5cf790d8cab566e760a949ba6e4e7e345a88675d902e43959190a5535c
-
SHA512
ed3067074d1e8d06df5ab1aa33b3d302a5228c309715bad160f217b7950bdc045f9e9fbee15dbae80af6dc3d33cac36e8c9d398cefd52004c2c2e01a290fe078
-
SSDEEP
3072:N9vunOcpodZVBY+PPxD6BFbO3mNmrB4ZRT6Zo7luRgDh4ddQI53z2:LGOcpodGwDGxYB4Z5h4sI53
Malware Config
Signatures
Files
-
764d0d5cf790d8cab566e760a949ba6e4e7e345a88675d902e43959190a5535c.exe windows x86
dde91f69924c06ad2b2e647d5bcfa27d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
ChrCmpIW
UrlEscapeA
gdi32
SetBitmapDimensionEx
GetDIBits
CombineRgn
GetROP2
GetRgnBox
Ellipse
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
memset
_amsg_exit
_initterm
_ismbblead
_wtoi64
_XcptFilter
_exit
gmtime
_cexit
__setusermatherr
system
__getmainargs
kernel32
lstrcpyA
GetModuleFileNameA
SetEvent
LoadLibraryExW
lstrlenA
LoadLibraryA
GetModuleHandleA
DeviceIoControl
GetThreadContext
GlobalDeleteAtom
GetProcAddress
CloseHandle
user32
CharToOemBuffA
GetWindowDC
ScrollWindowEx
IsCharUpperW
PostThreadMessageA
CharUpperA
CreateWindowExA
GetMessagePos
CheckRadioButton
SetParent
GetDCEx
wsprintfW
FindWindowW
GetSystemMetrics
TranslateAcceleratorW
GetCaretPos
ShowWindow
Exports
Exports
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.return Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 106KB - Virtual size: 230KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE