Static task
static1
Behavioral task
behavioral1
Sample
142d3db5357b0b20e5798de1763923bba401a59ce95a8d399f37a64281b1c3d2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
142d3db5357b0b20e5798de1763923bba401a59ce95a8d399f37a64281b1c3d2.exe
Resource
win10v2004-20221111-en
General
-
Target
142d3db5357b0b20e5798de1763923bba401a59ce95a8d399f37a64281b1c3d2
-
Size
40KB
-
MD5
a90ac281e572aab1ca34c988c1c2b221
-
SHA1
9134967349366d9c7378890ac38119d7f48e53e3
-
SHA256
142d3db5357b0b20e5798de1763923bba401a59ce95a8d399f37a64281b1c3d2
-
SHA512
668179f3479cf934465781a9b44c4a375a9f5923a8d84fd1108fdd5eadb952b8dec3165d795a7b3962ec5ec576008a5ee03aed1ebb26396d0c16ef8d205b96f9
-
SSDEEP
768:7F2Oi5T0xlRPeVI918IBqns8XCM1N2+HLCCRNg0VrvmP2Ys2clsIX2:7FqmJPsy8IBHB42+rE0VruPBtcRm
Malware Config
Signatures
Files
-
142d3db5357b0b20e5798de1763923bba401a59ce95a8d399f37a64281b1c3d2.exe windows x86
f113708e25b122772da3560d2483d6a5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
GetProcAddress
LoadLibraryA
lstrcatA
HeapAlloc
user32
SetWindowPos
SendMessageA
SetTimer
InvalidateRect
AttachThreadInput
GetForegroundWindow
KillTimer
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 390B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ