Static task
static1
Behavioral task
behavioral1
Sample
acb970b915a467c7377b8dfaae75e86d1273f1f4504dcd285bdca49a7c62149f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
acb970b915a467c7377b8dfaae75e86d1273f1f4504dcd285bdca49a7c62149f.exe
Resource
win10v2004-20221111-en
General
-
Target
acb970b915a467c7377b8dfaae75e86d1273f1f4504dcd285bdca49a7c62149f
-
Size
44KB
-
MD5
4aac85a4580c6fcbc7291a7c2d01f062
-
SHA1
c7e93a9f8cfbc52451be09558fe097b7d71be633
-
SHA256
acb970b915a467c7377b8dfaae75e86d1273f1f4504dcd285bdca49a7c62149f
-
SHA512
467c3280d04b908745266aed3807225616b21a198143088a52f0e19e4ade3e426c76061b624918f1dcba246367c5c17cb337fc30ab0075a6a107b95983512a32
-
SSDEEP
768:x0/KxQtBprfG2kxQBNabVi/RZDXeg24LgdB203rfh4f:x0z/nA+Napizx2qqZrf2f
Malware Config
Signatures
Files
-
acb970b915a467c7377b8dfaae75e86d1273f1f4504dcd285bdca49a7c62149f.exe windows x86
263b5bb4b6fe0ee99d93ce99235cf87e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowThreadProcessId
GetThreadDesktop
SetWindowTextA
GetScrollInfo
EnumDisplaySettingsA
SetDlgItemTextA
GetActiveWindow
EnumWindows
comctl32
ord17
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
kernel32
GetSystemDefaultLangID
GetUserDefaultLangID
GetTickCount
GetDateFormatA
GetStartupInfoA
HeapFree
SetFileAttributesA
HeapDestroy
DeleteCriticalSection
FreeLibrary
LoadLibraryA
GetProcAddress
InitializeCriticalSection
LocalFree
LocalAlloc
HeapAlloc
HeapCreate
GetTimeFormatA
IsBadReadPtr
GetLocalTime
GetHandleInformation
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 308B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 752B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ