Static task
static1
Behavioral task
behavioral1
Sample
683ff59e5fe6dd8c4cb68b758ae42d7c620ba5a9a95e3adab316ef36059b121c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
683ff59e5fe6dd8c4cb68b758ae42d7c620ba5a9a95e3adab316ef36059b121c.exe
Resource
win10v2004-20220812-en
General
-
Target
683ff59e5fe6dd8c4cb68b758ae42d7c620ba5a9a95e3adab316ef36059b121c
-
Size
52KB
-
MD5
c1b98b4a96e40ce440e113876a9024ae
-
SHA1
3553ab9779dc5f4c1b0f80b5aada639cdf8b702d
-
SHA256
683ff59e5fe6dd8c4cb68b758ae42d7c620ba5a9a95e3adab316ef36059b121c
-
SHA512
3da433684faa4937336ed556109769c2502a501bc70a045a534a73367815483adb792f863f353c7a53f102c5ff5725ca0a74f88ccca2ba1813d31dc592a4301f
-
SSDEEP
1536:DwIZqjmhjMzNa5sbn51eLRK9aPvyUJUK:X1j2ww5QRK9a3DUK
Malware Config
Signatures
Files
-
683ff59e5fe6dd8c4cb68b758ae42d7c620ba5a9a95e3adab316ef36059b121c.exe windows x86
ac6d1ff9e17f92c00347894c640da510
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
RegisterClassA
MessageBoxIndirectA
MessageBoxA
LoadAcceleratorsA
GetMessageA
GetDlgItem
EqualRect
DrawIcon
CreateCursor
CloseWindow
CharToOemA
ChangeMenuA
ActivateKeyboardLayout
kernel32
LoadLibraryA
TlsAlloc
SleepEx
Sleep
RaiseException
MapViewOfFile
lstrcmpiA
lstrcmpA
WriteFile
VirtualFree
VirtualAlloc
UnmapViewOfFile
TlsSetValue
EnumResourceTypesA
ExitProcess
GetModuleHandleA
GetPrivateProfileStringA
GetSystemTimeAsFileTime
GetVersion
GetVersionExA
InitializeCriticalSection
LocalAlloc
TlsFree
oleaut32
OleTranslateColor
SafeArrayAccessData
SafeArrayAllocDescriptor
VarBstrCmp
OleIconToCursor
Sections
.text Size: 16KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ