Static task
static1
Behavioral task
behavioral1
Sample
1905d26e10a38ae47023dbc0daae245f9da527d6bc5a70a22fbf4b78fe4cf0ce.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1905d26e10a38ae47023dbc0daae245f9da527d6bc5a70a22fbf4b78fe4cf0ce.exe
Resource
win10v2004-20220901-en
General
-
Target
1905d26e10a38ae47023dbc0daae245f9da527d6bc5a70a22fbf4b78fe4cf0ce
-
Size
71KB
-
MD5
fc277e618f0748f58de7a033f44c84df
-
SHA1
50fd4a0d4455a582d75cd5f0b8be52f48dcc885c
-
SHA256
1905d26e10a38ae47023dbc0daae245f9da527d6bc5a70a22fbf4b78fe4cf0ce
-
SHA512
b4436ea08422dba73082c7cd098df8e4ef076f3ded4759326f6879e4c6642b8376e624dce721ee4fc5af9e24dc81936331919f3fc144c381997405ae68a12820
-
SSDEEP
1536:MP89LrUrhcogQo66pyD7XAyWBtucIq2hyAaDveEKDrDrq3Z6kk5ZJ:hol7zDsFtBveE+DrqpxS
Malware Config
Signatures
Files
-
1905d26e10a38ae47023dbc0daae245f9da527d6bc5a70a22fbf4b78fe4cf0ce.exe windows x86
0a39a110196186afc43ed00e2550396b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ActivateKeyboardLayout
DefWindowProcW
DestroyIcon
EndMenu
GetKeyNameTextW
DlgDirListW
DrawEdge
DrawIconEx
CascadeWindows
CheckRadioButton
CreateWindowExW
GetMessageW
GetMessageTime
GetPropW
GetScrollRange
UnhookWinEvent
VkKeyScanExW
ToAsciiEx
SetWindowLongW
SetTimer
gdi32
GetMapMode
GetMiterLimit
GetPixel
CreateCompatibleDC
CreatePalette
GetBkColor
GetBrushOrgEx
GetCharWidthW
GetClipBox
GdiFlush
GetDeviceCaps
GetFontData
EqualRgn
EndDoc
Escape
FillPath
FillRgn
GetRelAbs
SetBkColor
GetTextFaceW
kernel32
ExitProcess
InitAtomTable
CreateFileW
WriteFile
ReadFile
SetConsoleCP
GetModuleHandleW
VirtualProtect
Sections
.text Size: 76KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE