Static task
static1
Behavioral task
behavioral1
Sample
c688d1afb8738917f4a16407de97ea9276baf86061e611a73010b8ed071a5d48.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c688d1afb8738917f4a16407de97ea9276baf86061e611a73010b8ed071a5d48.exe
Resource
win10v2004-20220812-en
General
-
Target
c688d1afb8738917f4a16407de97ea9276baf86061e611a73010b8ed071a5d48
-
Size
88KB
-
MD5
62e1b167400128fa2075388b7ece5aa1
-
SHA1
e64d6767d89f80075c69c2fee049ee57136f928a
-
SHA256
c688d1afb8738917f4a16407de97ea9276baf86061e611a73010b8ed071a5d48
-
SHA512
57a0f9a0e31b5db29da24a7d444c9948e63273c6bfd5024e8d1c6a78e584adf6bdd5bee2d5daca36ba4c0fbb10045703aba6314260cc1a41db443cd4e71774e1
-
SSDEEP
1536:GmBT7Smu0XPXotDSWkGhM0tTBdGoBk5TXa62Al1UJZ9T3eFNJIhsjzxGM:JBTOmuzlvAo2c62A/8T38IrM
Malware Config
Signatures
Files
-
c688d1afb8738917f4a16407de97ea9276baf86061e611a73010b8ed071a5d48.exe windows x86
50c384a652c3ed82472dc187c827d385
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegEnumKeyA
RegDeleteValueA
kernel32
GetFileType
ExitProcess
WriteFile
lstrcpyA
GetLastError
VirtualQuery
GetStringTypeA
GetVersionExA
VirtualFree
SetThreadLocale
LoadLibraryA
GetFileSize
LoadResource
ExitThread
WaitForSingleObject
GetACP
GetStdHandle
FindClose
VirtualAllocEx
SetEndOfFile
lstrcmpiA
GetCurrentThreadId
RaiseException
LocalAlloc
GetCurrentThread
GetFullPathNameA
GetVersion
VirtualAlloc
ReadFile
GetModuleHandleA
GetLocaleInfoA
GetSystemDefaultLangID
FindFirstFileA
lstrcmpA
MoveFileExA
CloseHandle
EnterCriticalSection
CreateThread
HeapAlloc
lstrlenA
Sleep
GetProcAddress
GetDiskFreeSpaceA
LockResource
GlobalAddAtomA
GlobalAlloc
LocalFree
GetThreadLocale
SetHandleCount
FormatMessageA
GlobalDeleteAtom
InitializeCriticalSection
GetModuleFileNameA
GetCPInfo
GetCurrentProcess
SetLastError
CompareStringA
GetTickCount
LoadLibraryExA
CreateEventA
GetOEMCP
oleaut32
SysFreeString
SafeArrayCreate
RegisterTypeLib
SafeArrayUnaccessData
VariantCopyInd
shell32
SHFileOperationA
SHGetDesktopFolder
SHGetSpecialFolderLocation
ole32
CoUnmarshalInterface
OleRun
StgCreateDocfileOnILockBytes
CreateStreamOnHGlobal
CreateBindCtx
StringFromIID
CoReleaseMarshalData
CoRegisterClassObject
CLSIDFromString
CLSIDFromProgID
msvcrt
memcpy
atan
memmove
malloc
strncmp
user32
DrawIcon
GetMenuState
GetMenuStringA
GetScrollPos
CallNextHookEx
GetSysColorBrush
SetWindowTextA
GetDC
FillRect
GetActiveWindow
GetDesktopWindow
GetParent
GetWindow
GetScrollRange
GetCursor
DispatchMessageW
DrawEdge
GetSubMenu
EnableMenuItem
GetMessagePos
CreatePopupMenu
GetScrollInfo
GetMenuItemInfoA
IsWindowVisible
EqualRect
CreateIcon
IsChild
IsWindowEnabled
GetWindowTextA
GetPropA
GetSysColor
EnumWindows
GetMenuItemID
DrawMenuBar
comdlg32
ChooseColorA
FindTextA
GetSaveFileNameA
Sections
CODE Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 930B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ