Static task
static1
Behavioral task
behavioral1
Sample
c787fa42842573b4d133172c1d52176e1ed43483bf9af2ec5766d978fab97c64.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c787fa42842573b4d133172c1d52176e1ed43483bf9af2ec5766d978fab97c64.exe
Resource
win10v2004-20221111-en
General
-
Target
c787fa42842573b4d133172c1d52176e1ed43483bf9af2ec5766d978fab97c64
-
Size
229KB
-
MD5
b9dad12a311f8ad39b226eb06db494ae
-
SHA1
30f26b753e22f88ef6010e2e3ea56c874be2c9fd
-
SHA256
c787fa42842573b4d133172c1d52176e1ed43483bf9af2ec5766d978fab97c64
-
SHA512
97a59eec63f809856bacbca2217ae5b89925127e349ef4674b2b7a8b03e421b87637f764728d20763c90f1908147352737f49afc31b087be7c1f548c3baeb928
-
SSDEEP
1536:IPXNwW1TtR0pc+YYcDRGEFOooJTbypkppFl:eiYJR0pcycvF43IkbF
Malware Config
Signatures
Files
-
c787fa42842573b4d133172c1d52176e1ed43483bf9af2ec5766d978fab97c64.exe windows x86
0ca068ee4534d0b56ba0a9154d58b7d1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetHandleInformation
ConnectNamedPipe
Thread32Next
GlobalFlags
IsBadWritePtr
GlobalAlloc
CreatePipe
WritePrivateProfileSectionA
GetCommMask
EnumTimeFormatsW
EnumDateFormatsA
GetPrivateProfileSectionA
IsBadStringPtrW
EnumTimeFormatsW
GlobalFindAtomA
GetProcessHeaps
SetNamedPipeHandleState
CreateHardLinkW
GlobalFlags
GetProfileIntA
GlobalAddAtomA
EnumTimeFormatsW
SetHandleInformation
SetConsoleCursor
IsBadStringPtrA
ReadConsoleOutputW
CreateHardLinkW
IsBadHugeWritePtr
FindCloseChangeNotification
GlobalAddAtomA
SetConsoleActiveScreenBuffer
GetBinaryTypeA
GetProcessAffinityMask
Process32First
CreateDirectoryExA
ClearCommBreak
SetHandleInformation
EnumTimeFormatsW
GetCommTimeouts
ExpandEnvironmentStringsA
CreateHardLinkW
FindNextFileW
ExpandEnvironmentStringsA
PeekConsoleInputA
Heap32ListFirst
Process32First
user32
SetScrollRange
FindWindowExW
GetWindowRgn
CreateDialogParamA
CreateWindowExA
SetScrollInfo
GetMenuItemCount
FindWindowExA
FindWindowExW
ShowScrollBar
ActivateKeyboardLayout
WINNLSEnableIME
FindWindowA
RemovePropW
SetWindowsHookW
UnhookWindowsHookEx
DdeCmpStringHandles
MonitorFromPoint
GetTopWindow
SetWindowTextA
CreateWindowExA
HiliteMenuItem
GetCursor
DdeCmpStringHandles
ArrangeIconicWindows
EnumDesktopWindows
SetActiveWindow
DdeConnect
TileChildWindows
Sections
.text Size: 212KB - Virtual size: 220KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tabl Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tabl Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tabl Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tabl Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.tabl Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE