Static task
static1
Behavioral task
behavioral1
Sample
d5f78a1ecba3915d84c5467a64370009242d49bc23abda04cd74ab307e955743.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d5f78a1ecba3915d84c5467a64370009242d49bc23abda04cd74ab307e955743.exe
Resource
win10v2004-20220901-en
General
-
Target
d5f78a1ecba3915d84c5467a64370009242d49bc23abda04cd74ab307e955743
-
Size
80KB
-
MD5
aafafd170827a39a5e654b1e6c05cc5f
-
SHA1
fa1dbff733c97bfd11ab4bfc9ab95607d55fdd92
-
SHA256
d5f78a1ecba3915d84c5467a64370009242d49bc23abda04cd74ab307e955743
-
SHA512
a8079158ec109b5266e6fff81a3498acd59a41c1068c4fc6ed1f7eb8dca7ef343681d2cd8507ec5174b84b3c770ad0bbc9cb7846f6dfaf3caa56b9505f26cbcb
-
SSDEEP
1536:pJev3S7erSoUi/GbT8LHNnrrqcgiHyP/:pJevUer02HlrrgiSn
Malware Config
Signatures
Files
-
d5f78a1ecba3915d84c5467a64370009242d49bc23abda04cd74ab307e955743.exe windows x86
6694b436c6cb48f74fdf121b77d06c23
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
HeapAlloc
GetProcAddress
GetModuleHandleA
LoadLibraryA
InterlockedDecrement
LocalFree
InterlockedIncrement
GetVersionExW
UnhandledExceptionFilter
user32
EnumChildWindows
SetScrollPos
EndMenu
EndDialog
EndDeferWindowPos
EnableScrollBar
EnableMenuItem
EmptyClipboard
CloseClipboard
ClipCursor
ClientToScreen
ChildWindowFromPointEx
ChildWindowFromPoint
GetWindowTextLengthW
EnableWindow
DialogBoxParamW
CreateDialogParamW
GetWindowTextW
SetWindowPos
SetCursor
SetForegroundWindow
FindWindowW
GetSystemMetrics
MoveWindow
SendMessageW
CharNextW
CheckMenuItem
CharPrevExA
CharPrevW
CharToOemA
CharToOemBuffA
CharToOemBuffW
CheckDlgButton
CopyIcon
CopyImage
EndPaint
gdi32
SetAbortProc
GetTextMetricsW
SetBkMode
StartDocW
SetWindowExtEx
SetViewportExtEx
SetMapMode
CreateFontIndirectW
StartPage
LPtoDP
AbortDoc
EndDoc
DeleteDC
TextOutW
GetTextExtentPoint32W
CreateDCW
SelectObject
GetTextFaceW
EndPage
advapi32
RegOpenKeyW
RegOpenKeyA
msi
ord55
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
iata1 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
iata2 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
iata3 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
iata4 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
iata5 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
iata6 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
iata7 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 746B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ