Static task
static1
Behavioral task
behavioral1
Sample
849efb71066bc970370b96633396a6030faea1acab7da3f5c571ea3d449b1032.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
849efb71066bc970370b96633396a6030faea1acab7da3f5c571ea3d449b1032.exe
Resource
win10v2004-20220901-en
General
-
Target
849efb71066bc970370b96633396a6030faea1acab7da3f5c571ea3d449b1032
-
Size
97KB
-
MD5
727060905ca6867ccde60d535e70875d
-
SHA1
2b947fb7cf3ade1500e29fa50ac230c611b06efd
-
SHA256
849efb71066bc970370b96633396a6030faea1acab7da3f5c571ea3d449b1032
-
SHA512
acb28f56c88b012d25a23fa3f37eead380d6c4ccd9679049f20eb003c940502a7110d18faf169ce0c0414a7d2c5b96948af629750c8fda09b9cc172e303bbcff
-
SSDEEP
1536:JWgQpInuM38w5pKxdJs7E1uFtIzAZccJsiDw7z2YgpqftjrARCrnW:JnQpIuMMw/IJs7E1CQEDw/wYfh8sW
Malware Config
Signatures
Files
-
849efb71066bc970370b96633396a6030faea1acab7da3f5c571ea3d449b1032.exe windows x86
feee1c6a4674eb2b72fff957e6d909fc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThread
GetFileType
FindClose
HeapDestroy
HeapFree
lstrcatA
EnterCriticalSection
SetThreadLocale
GetCommandLineA
lstrcpynA
GlobalAlloc
lstrcpyA
GetVersionExA
SetErrorMode
CreateEventA
SetEndOfFile
GetOEMCP
GetModuleHandleA
ExitThread
InitializeCriticalSection
GetLocalTime
FormatMessageA
SetLastError
ReadFile
CreateThread
CloseHandle
LoadResource
SetEvent
GlobalAddAtomA
GetModuleFileNameA
GetSystemDefaultLangID
GetDateFormatA
MoveFileExA
HeapAlloc
GetVersion
GetFullPathNameA
GetLastError
WideCharToMultiByte
FindFirstFileA
LoadLibraryExA
RaiseException
ExitProcess
GetLocaleInfoA
VirtualAlloc
GetACP
DeleteCriticalSection
GetCPInfo
GlobalDeleteAtom
lstrlenA
LoadLibraryA
WriteFile
GetStdHandle
CreateFileA
MoveFileA
GetCurrentProcessId
SetFilePointer
SizeofResource
FreeResource
Sleep
GetThreadLocale
GetStringTypeA
lstrcmpA
GetProcessHeap
user32
DrawFrameControl
SetWindowPos
DefWindowProcA
SystemParametersInfoA
GetWindowTextA
GetMenuItemCount
GetForegroundWindow
GetWindow
GetLastActivePopup
GetActiveWindow
CallNextHookEx
GetCursorPos
GetMessagePos
IsChild
DrawTextA
IsDialogMessageA
SetWindowTextA
GetSubMenu
DispatchMessageW
DispatchMessageA
CharLowerA
GetMenuState
GetDesktopWindow
CharToOemA
GetSysColor
EnableMenuItem
EnumChildWindows
GetMenuItemInfoA
IsWindowVisible
GetCursor
DrawEdge
GetFocus
GetMenuStringA
EndPaint
FrameRect
EnableWindow
DrawIconEx
GetParent
CreatePopupMenu
GetScrollPos
CharNextA
GetSysColorBrush
GetScrollInfo
EqualRect
CallWindowProcA
GetClassInfoA
GetCapture
GetDCEx
GetPropA
DefMDIChildProcA
DrawIcon
ShowWindow
GetMenuItemID
BeginPaint
GetDlgItem
SetTimer
IsMenu
SetWindowLongA
CreateWindowExA
IsWindowEnabled
EnumThreadWindows
GetIconInfo
GetMenu
ClientToScreen
RegisterClassA
comdlg32
GetFileTitleA
FindTextA
msvcrt
memmove
log
malloc
memcpy
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 1024B - Virtual size: 702B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ