Static task
static1
Behavioral task
behavioral1
Sample
b0a8c94934afe94d44622d76b8f7acb760427c34de4663fe6f918b4a75e47cd9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b0a8c94934afe94d44622d76b8f7acb760427c34de4663fe6f918b4a75e47cd9.exe
Resource
win10v2004-20220812-en
General
-
Target
b0a8c94934afe94d44622d76b8f7acb760427c34de4663fe6f918b4a75e47cd9
-
Size
272KB
-
MD5
e394f37b4c3312e0fff27d02e1b45300
-
SHA1
2b14d87f985fd5813fcfb8b9470984bf1d9271fd
-
SHA256
b0a8c94934afe94d44622d76b8f7acb760427c34de4663fe6f918b4a75e47cd9
-
SHA512
3dfacede4c4ba8ff8087291af9bf44de05a4242e31cc84c37f97bd783c4ee09a2a04cb3b3a356104ca0080b7e9777d6caa5fb0d20b5c6f712f23a42c547eb802
-
SSDEEP
6144:8hKio2S7+3Q4K4dvIAX55iSqwQsv73P6R+vIA6MFmB1Fw+4sf3:kg+3Q8hX7ce76QvIJMKwlsf3
Malware Config
Signatures
Files
-
b0a8c94934afe94d44622d76b8f7acb760427c34de4663fe6f918b4a75e47cd9.exe windows x86
eb87fe4caf1ead7a00ed43159f7048da
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetActiveWindow
EnumChildWindows
SetWindowTextA
IsCharAlphaA
DialogBoxParamA
SetWindowLongA
MoveWindow
GetDesktopWindow
ole32
CoRevokeClassObject
comctl32
InitCommonControlsEx
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
kernel32
GetTickCount
LoadResource
IsBadStringPtrA
InitializeCriticalSection
GetTimeZoneInformation
HeapDestroy
GetStartupInfoA
FindResourceExA
ExitProcess
GetDateFormatA
GetProcAddress
FreeLibrary
LoadLibraryA
LocalFree
HeapCreate
ResumeThread
LocalAlloc
DeleteCriticalSection
Sections
.text Size: 262KB - Virtual size: 261KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ