Static task
static1
Behavioral task
behavioral1
Sample
f0b5d86196bb1332be28e5de2a47ca7cf3feada4c8a7f616cefb33e5b8b64caa.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f0b5d86196bb1332be28e5de2a47ca7cf3feada4c8a7f616cefb33e5b8b64caa.exe
Resource
win10v2004-20221111-en
General
-
Target
f0b5d86196bb1332be28e5de2a47ca7cf3feada4c8a7f616cefb33e5b8b64caa
-
Size
97KB
-
MD5
773f5f3e0f9cf07e3a11a8c6e33defe2
-
SHA1
69bb4ee9d196abcca65e148199860ce89dc46e11
-
SHA256
f0b5d86196bb1332be28e5de2a47ca7cf3feada4c8a7f616cefb33e5b8b64caa
-
SHA512
573b5e68c7ec9a4fb0089e02a748b4d950eac79d78fc9ad6c916e5234268bb4718ff82ff88fdece4b3a3da7f8201dfb91ebf6e2c25fd8c9c7fa8a160ad69092c
-
SSDEEP
3072:xLYQfJOtGiohHKpS6xW3n8/n1kEM7BNVF887FgR:xLYWOMioINgpF88q
Malware Config
Signatures
Files
-
f0b5d86196bb1332be28e5de2a47ca7cf3feada4c8a7f616cefb33e5b8b64caa.exe windows x86
8e36d75c4e80dfa777bf1fc264d34a4b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SelectPalette
SetMapMode
SelectObject
CreateSolidBrush
CreatePalette
PatBlt
Rectangle
SetBkMode
DeleteDC
GetObjectA
CreateCompatibleDC
kernel32
QueryPerformanceCounter
GetVersion
IsDebuggerPresent
GetCommandLineA
MulDiv
lstrlenA
lstrcmpiW
SetLastError
VirtualAlloc
GlobalFindAtomW
VirtualFree
user32
GetSystemMetrics
TranslateMessage
GetDesktopWindow
DispatchMessageA
CharNextA
ShowWindow
GetDC
glu32
gluTessCallback
comctl32
InitCommonControls
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Kpci Qxl Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ