Static task
static1
Behavioral task
behavioral1
Sample
3fe1e9b4de854e87996c17234a7992059b46523cf10e8319b257314860ad2e49.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3fe1e9b4de854e87996c17234a7992059b46523cf10e8319b257314860ad2e49.exe
Resource
win10v2004-20220812-en
General
-
Target
3fe1e9b4de854e87996c17234a7992059b46523cf10e8319b257314860ad2e49
-
Size
77KB
-
MD5
2af07da7c368a1a5f084356584f70ac5
-
SHA1
f11b7c985a2ebe04e13acc81e130cf78fa3171be
-
SHA256
3fe1e9b4de854e87996c17234a7992059b46523cf10e8319b257314860ad2e49
-
SHA512
bcdadaa99f020b35dc386172dfff49e6563390451285f6f54e99385ff05a9a8f3a17b785d86372c0569eff1fe91ac03fa41b2d3e5ef4646b5f95b7c9f69a534f
-
SSDEEP
1536:WbhFis91rjtXrY44LBim65VBMREfR7mnCduN5lVogrZBfG33duTTt/i:8is3BraLBiHV7fR7mnl5/123W8
Malware Config
Signatures
Files
-
3fe1e9b4de854e87996c17234a7992059b46523cf10e8319b257314860ad2e49.exe windows x86
2be7101594f1231bb86e38a119cfce1a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
DeleteObject
SetBkColor
SelectObject
SetTextColor
PatBlt
GetDeviceCaps
ExtTextOutW
IntersectClipRect
CreateCompatibleDC
DeleteDC
CreateDIBitmap
CreateSolidBrush
SetBkMode
BitBlt
GetTextExtentPointW
ws2_32
WSAGetLastError
user32
MessageBoxA
InflateRect
DefDlgProcW
BeginPaint
IntersectRect
SetWindowLongA
ExcludeUpdateRgn
GetWindowRect
ValidateRect
OffsetRect
GetFocus
DrawFocusRect
CallWindowProcW
SetPropW
GetClassNameW
CharNextW
HideCaret
ReleaseDC
GetSystemMetrics
RemovePropW
GetParent
IsWindowEnabled
MapWindowPoints
GetWindow
ScreenToClient
GetSysColor
GetDC
CallNextHookEx
UnhookWindowsHookEx
SendMessageW
CharPrevW
ShowCaret
EndPaint
SetWindowsHookExW
InvalidateRect
GetWindowLongW
IsIconic
DefWindowProcW
GetWindowDC
DrawTextW
GetWindowTextLengthW
GetWindowTextW
GetClassInfoW
GetClientRect
IsWindowUnicode
ClientToScreen
SetWindowLongW
GetPropW
kernel32
GlobalFree
InitializeCriticalSection
EnterCriticalSection
GlobalAddAtomW
SizeofResource
GlobalDeleteAtom
VirtualAlloc
lstrcmpiW
GetEnvironmentVariableW
GetModuleHandleA
LoadResource
GetModuleFileNameW
GetCurrentThreadId
GlobalAlloc
LeaveCriticalSection
GetWindowsDirectoryW
GetProcAddress
GetProfileStringW
FindResourceW
GetVersion
lstrcmpW
GetSystemDirectoryW
adsldpc
ADsFreeColumn
ntdll
NtFindAtom
Sections
.textbss Size: - Virtual size: 656KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 512B - Virtual size: 444B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 772B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.idata Size: 74KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
jzpsvqi Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE