?CreateDlgMessage@@YGHPAXPADK|U
Static task
static1
Behavioral task
behavioral1
Sample
ae377887ee626e6ebf80c2562e1cb00e2477298c4a7eb91cb8941d772bcf8385.exe
Resource
win7-20220812-en
General
-
Target
ae377887ee626e6ebf80c2562e1cb00e2477298c4a7eb91cb8941d772bcf8385
-
Size
52KB
-
MD5
9dc4f7d806d39b10e99a49a7982706fa
-
SHA1
cae85d3f4e880511c7e2b22d4009ccf20cf9675e
-
SHA256
ae377887ee626e6ebf80c2562e1cb00e2477298c4a7eb91cb8941d772bcf8385
-
SHA512
f8cd3147bcb515967ff8750701db3c1fa080bd24d45821b74cf0b387dd34ea47b522c5b80943fef675dd6199bf0f85ba73902a4f2fcc240d24a13bb867de38f2
-
SSDEEP
1536:fo4Fy87OMzA85OuFyINrPypWVsStx/gQQ3:3/zA9cDrEWDtml3
Malware Config
Signatures
Files
-
ae377887ee626e6ebf80c2562e1cb00e2477298c4a7eb91cb8941d772bcf8385.exe windows x86
b80f76715f133bbe0f9720b6d4ff5593
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
FindWindowW
SendMessageTimeoutA
GetWindowDC
IsCharUpperW
GetClassLongW
SetCursor
EnableScrollBar
wsprintfW
GetMenuState
shlwapi
ChrCmpIW
UrlGetLocationW
StrCmpIW
gdi32
GetCharWidth32W
CreateFontIndirectA
Polygon
SelectPalette
LPtoDP
msvcrt
_wtoi
_controlfp
memset
strcpy
setvbuf
__set_app_type
__p__fmode
__p__commode
_amsg_exit
_initterm
atoi
_ismbblead
_XcptFilter
_exit
_cexit
__setusermatherr
__getmainargs
localtime
kernel32
lstrlenA
GetCurrentDirectoryW
FreeLibrary
GetModuleFileNameA
VerifyVersionInfoW
LoadLibraryA
lstrcatW
GetModuleHandleA
GlobalAddAtomW
Exports
Exports
Sections
.text Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ort Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 22KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE