?WIBLiyhpl_JEoxoskM@@YGGGH@Z
Static task
static1
Behavioral task
behavioral1
Sample
67ac8a7948c19b94a25753a74aca75651fe9bd8fa17361efc558e2688de232ee.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
67ac8a7948c19b94a25753a74aca75651fe9bd8fa17361efc558e2688de232ee.exe
Resource
win10v2004-20221111-en
General
-
Target
67ac8a7948c19b94a25753a74aca75651fe9bd8fa17361efc558e2688de232ee
-
Size
138KB
-
MD5
8bf926f4d4c359b74391dd58d26d769f
-
SHA1
5123b5f95073cf3d32b66dd850f17ea9d707b725
-
SHA256
67ac8a7948c19b94a25753a74aca75651fe9bd8fa17361efc558e2688de232ee
-
SHA512
ae7dbf1ea7decdff9a1f1d5a3be968c5ab6e0290149f5232c3b06654dada129e8543e81649ea5c7bb86254c81310838589c306848e6a5d81e396de9cb9f2727f
-
SSDEEP
3072:V9kx7xWEd5JPjgfPUH0/UVTgSDZ5TCQ3lH9P6bef:V9kx7MEd7g0H0/UZgSd5TBVH9Sbe
Malware Config
Signatures
Files
-
67ac8a7948c19b94a25753a74aca75651fe9bd8fa17361efc558e2688de232ee.exe windows x86
c44696775a6d3d5dfd20e1f5b09e0eaf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
memset
user32
FrameRect
CharPrevW
LoadAcceleratorsW
GetMenuItemID
DefFrameProcA
LoadStringA
GetWindowRect
GetMenuItemCount
TrackPopupMenuEx
DispatchMessageA
IntersectRect
GetDoubleClickTime
GetIconInfo
GetClassLongA
CreateWindowExA
CharPrevA
GetMonitorInfoW
IsDialogMessageA
TranslateAcceleratorA
DrawEdge
CallWindowProcW
GetDlgItemTextW
CreateDialogIndirectParamW
FindWindowA
GetMessageW
SetScrollPos
DispatchMessageW
CharLowerA
RemovePropW
LoadImageA
shlwapi
PathRelativePathToA
UrlGetPartA
gdi32
GetBitmapBits
SaveDC
CreateDIBSection
SetBrushOrgEx
UnrealizeObject
GetTextColor
GetDIBColorTable
Escape
SetDIBColorTable
SetDIBitsToDevice
GetRgnBox
ScaleWindowExtEx
comctl32
ImageList_Read
CreatePropertySheetPageW
InitCommonControlsEx
msvcrt
exit
kernel32
DeleteFileW
GetModuleHandleA
EnterCriticalSection
GetCurrentThreadId
SetHandleCount
SetLocalTime
lstrcmpA
GetModuleFileNameA
lstrcpynW
lstrcmpW
WaitForSingleObject
GetStringTypeExW
EscapeCommFunction
GetCommConfig
FindFirstChangeNotificationW
GetSystemWindowsDirectoryW
lstrlenA
comdlg32
FindTextW
GetSaveFileNameW
ReplaceTextW
PageSetupDlgW
Exports
Exports
Sections
.text Size: 127KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 512B - Virtual size: 312B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 146B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.$debug Size: 512B - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data1 Size: 512B - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data2 Size: 512B - Virtual size: 401B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data3 Size: 512B - Virtual size: 403B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data4 Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1020B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ