Static task
static1
Behavioral task
behavioral1
Sample
65b8f975443bce5dae4504e4c15b4204dc2b2f6ae543b728794f88995d8dbb05.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
65b8f975443bce5dae4504e4c15b4204dc2b2f6ae543b728794f88995d8dbb05.exe
Resource
win10v2004-20220812-en
General
-
Target
65b8f975443bce5dae4504e4c15b4204dc2b2f6ae543b728794f88995d8dbb05
-
Size
75KB
-
MD5
b584dc5c5a0e79b5fc9b47871bdd0f51
-
SHA1
2e83a3af9decbaea96109b0745b61bf33e743dcc
-
SHA256
65b8f975443bce5dae4504e4c15b4204dc2b2f6ae543b728794f88995d8dbb05
-
SHA512
6ed9ead50f23afc69bdb04bb99ab1ec33041cb5a04c473d8839093a2e88aadb1970ac301bd1d4f4a224b18176a003f2a60eb1b26a771b04ff115e9ae1e692d9a
-
SSDEEP
1536:g2rPjVxk17pFF8MOkeLgmJuFGviQKa2XAmvkdWqy9Emj/2uPKWpyg:NaeVTTtJK1XAakdG9Ec//Yg
Malware Config
Signatures
Files
-
65b8f975443bce5dae4504e4c15b4204dc2b2f6ae543b728794f88995d8dbb05.exe windows x86
24e010f2f56bca6536409985f7426e85
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
GetSubMenu
PostQuitMessage
GetSysColor
UnhookWindowsHookEx
EnableMenuItem
SetWindowPos
GetSysColorBrush
GetScrollPos
SetWindowTextA
EqualRect
GetMessageA
FrameRect
EnumWindows
kernel32
SetUnhandledExceptionFilter
GetStartupInfoA
InterlockedExchange
QueryPerformanceCounter
VirtualAllocEx
GetThreadLocale
GetACP
GetTempPathA
GetFileAttributesA
GetTimeZoneInformation
ExitProcess
FileTimeToSystemTime
GetOEMCP
RtlUnwind
GetCurrentProcessId
gdi32
CopyEnhMetaFileA
CreateCompatibleBitmap
ExcludeClipRect
SetViewportExtEx
FillRgn
CreateICW
DPtoLP
GetMapMode
SelectClipPath
ole32
CoInitialize
CoInitializeSecurity
CoTaskMemRealloc
CoCreateInstance
CoRevokeClassObject
StgOpenStorage
StringFromGUID2
DoDragDrop
OleRun
advapi32
CryptHashData
RegCreateKeyA
GetUserNameA
GetSecurityDescriptorDacl
RegQueryValueExW
CheckTokenMembership
RegCreateKeyExW
AdjustTokenPrivileges
QueryServiceStatus
FreeSid
msvcrt
_fdopen
strlen
_lock
strcspn
__initenv
__setusermatherr
fprintf
__getmainargs
_strdup
puts
iswspace
_flsbuf
_CIpow
strncpy
_mbscmp
signal
raise
fflush
comctl32
ImageList_GetIcon
ImageList_LoadImageW
ImageList_DrawEx
ImageList_DragEnter
ImageList_GetIconSize
ImageList_ReplaceIcon
ImageList_Write
ImageList_LoadImageA
InitCommonControls
ImageList_Destroy
ImageList_GetBkColor
CreatePropertySheetPageA
ImageList_SetIconSize
shell32
DragAcceptFiles
ExtractIconW
DragQueryFileA
DoEnvironmentSubstW
SHGetPathFromIDList
ShellExecuteEx
CommandLineToArgvW
DragQueryFileW
SHBrowseForFolderA
ExtractIconExW
ShellExecuteW
oleaut32
SafeArrayGetUBound
SafeArrayPutElement
SafeArrayUnaccessData
SysReAllocStringLen
VariantCopy
SafeArrayRedim
SafeArrayPtrOfIndex
SafeArrayCreate
Sections
.text Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE