Static task
static1
Behavioral task
behavioral1
Sample
84be4a3fa560ee4cceadb5495e75d31d00e8712a9ab95c41521e1b914842f3df.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
84be4a3fa560ee4cceadb5495e75d31d00e8712a9ab95c41521e1b914842f3df.exe
Resource
win10v2004-20221111-en
General
-
Target
84be4a3fa560ee4cceadb5495e75d31d00e8712a9ab95c41521e1b914842f3df
-
Size
229KB
-
MD5
c6930b67fc16d1ef8e8cb610347836ca
-
SHA1
6784ac19fd89dac13763e53dd47f6a21da2f3305
-
SHA256
84be4a3fa560ee4cceadb5495e75d31d00e8712a9ab95c41521e1b914842f3df
-
SHA512
e0809acc21831a1f50e0e4958b3bb63f56915a4234f544073a272a435b2bbbb4deb46a5e168793d98e429c48095a7a301d4cbfffcd84679d0a904b0a349ae292
-
SSDEEP
1536:IPXNwW1TtR0pc+YYcDRGEFOooJTbypkppFl:eiYJR0pcycvF43IkbF
Malware Config
Signatures
Files
-
84be4a3fa560ee4cceadb5495e75d31d00e8712a9ab95c41521e1b914842f3df.exe windows x86
0ca068ee4534d0b56ba0a9154d58b7d1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetHandleInformation
ConnectNamedPipe
Thread32Next
GlobalFlags
IsBadWritePtr
GlobalAlloc
CreatePipe
WritePrivateProfileSectionA
GetCommMask
EnumTimeFormatsW
EnumDateFormatsA
GetPrivateProfileSectionA
IsBadStringPtrW
EnumTimeFormatsW
GlobalFindAtomA
GetProcessHeaps
SetNamedPipeHandleState
CreateHardLinkW
GlobalFlags
GetProfileIntA
GlobalAddAtomA
EnumTimeFormatsW
SetHandleInformation
SetConsoleCursor
IsBadStringPtrA
ReadConsoleOutputW
CreateHardLinkW
IsBadHugeWritePtr
FindCloseChangeNotification
GlobalAddAtomA
SetConsoleActiveScreenBuffer
GetBinaryTypeA
GetProcessAffinityMask
Process32First
CreateDirectoryExA
ClearCommBreak
SetHandleInformation
EnumTimeFormatsW
GetCommTimeouts
ExpandEnvironmentStringsA
CreateHardLinkW
FindNextFileW
ExpandEnvironmentStringsA
PeekConsoleInputA
Heap32ListFirst
Process32First
user32
SetScrollRange
FindWindowExW
GetWindowRgn
CreateDialogParamA
CreateWindowExA
SetScrollInfo
GetMenuItemCount
FindWindowExA
FindWindowExW
ShowScrollBar
ActivateKeyboardLayout
WINNLSEnableIME
FindWindowA
RemovePropW
SetWindowsHookW
UnhookWindowsHookEx
DdeCmpStringHandles
MonitorFromPoint
GetTopWindow
SetWindowTextA
CreateWindowExA
HiliteMenuItem
GetCursor
DdeCmpStringHandles
ArrangeIconicWindows
EnumDesktopWindows
SetActiveWindow
DdeConnect
TileChildWindows
Sections
.text Size: 212KB - Virtual size: 220KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tabl Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tabl Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tabl Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tabl Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.tabl Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE