Static task
static1
Behavioral task
behavioral1
Sample
af0367175d34483f8f15d6a5d1e74201115e97b13c34fbfd2da31c86033f813c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
af0367175d34483f8f15d6a5d1e74201115e97b13c34fbfd2da31c86033f813c.exe
Resource
win10v2004-20220812-en
General
-
Target
af0367175d34483f8f15d6a5d1e74201115e97b13c34fbfd2da31c86033f813c
-
Size
208KB
-
MD5
bdb28164420e92c064ca7a8974413e4b
-
SHA1
945a8f8b7c1cf7855074a79ef9580d30749190b8
-
SHA256
af0367175d34483f8f15d6a5d1e74201115e97b13c34fbfd2da31c86033f813c
-
SHA512
4d82654421414cbac91e7a587f0c38b25a53a88961d1f176215d00832e01f6729d8ac2ae804d36bf65f5fe13be61166a6ffe9c0008ac7236711f87ae3d7bd74e
-
SSDEEP
3072:OnCPLHSzcvHunxWS1mA0+hHc1+wyLmRXMIm9XR77Oa0fxLEiMIGVCYGsulmSbReH:mCPLHiWS136AwyWS9XTFcYGNlm
Malware Config
Signatures
Files
-
af0367175d34483f8f15d6a5d1e74201115e97b13c34fbfd2da31c86033f813c.exe windows x86
b650d219ea962e51e67223ead1b7fa75
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
ExitProcess
ExitThread
FindFirstFileA
GetACP
GetCommandLineA
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatA
GetModuleHandleA
GetStartupInfoA
GetStringTypeW
GetSystemTimeAsFileTime
GetTickCount
GlobalUnlock
InterlockedIncrement
IsBadReadPtr
IsBadStringPtrA
LoadLibraryA
QueryPerformanceCounter
SetErrorMode
SetUnhandledExceptionFilter
VirtualAlloc
VirtualProtect
msvcrt
strstr
strncmp
atoi
strcmp
fwrite
wcschr
user32
ModifyMenuA
GetWindowTextA
DrawIconEx
DrawTextA
comctl32
GetEffectiveClientRect
InitCommonControls
ShowHideMenuCtl
CreateToolbarEx
Sections
.text Size: 94KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 29KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ