Static task
static1
Behavioral task
behavioral1
Sample
baeca8410e88f3413b9f9d56c1680d515ef6276101dc1d1019f06f1e0977f4ac.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
baeca8410e88f3413b9f9d56c1680d515ef6276101dc1d1019f06f1e0977f4ac.exe
Resource
win10v2004-20220812-en
General
-
Target
baeca8410e88f3413b9f9d56c1680d515ef6276101dc1d1019f06f1e0977f4ac
-
Size
169KB
-
MD5
77d73a8a3adf0c642f9659cb89b581ed
-
SHA1
9f271a7537f6005f588e849d98be7e545b19b705
-
SHA256
baeca8410e88f3413b9f9d56c1680d515ef6276101dc1d1019f06f1e0977f4ac
-
SHA512
4d865b22da01e75e3cf64978be0815ee23c8d5810ef9e90f03b5cf76369cffd05f940b0bcab935f3d988184f11d6e8b31a09910b7f6090d6320a179d6a5d605e
-
SSDEEP
3072:TIKc/S3RJPKyzpTzbuYvM91gqxBVaW1X28gdc6UeqQSYW+SvGEv:cKp3fvl/byTVaW1GNlvEYIvGE
Malware Config
Signatures
Files
-
baeca8410e88f3413b9f9d56c1680d515ef6276101dc1d1019f06f1e0977f4ac.exe windows x86
c58ce54b6a642810e8ab734231956e59
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetMenuItemID
CreateWindowExA
DrawMenuBar
GetScrollRange
CharLowerBuffA
DefWindowProcA
EnumWindows
FillRect
DrawTextA
EnumChildWindows
GetForegroundWindow
CheckMenuItem
DeferWindowPos
GetDCEx
GetKeyState
GetCursor
CreatePopupMenu
GetScrollInfo
GetClassInfoA
GetMenu
SetWindowTextA
SetCursor
HideCaret
IsDialogMessageA
GetKeyNameTextA
EnableScrollBar
GetFocus
GetSubMenu
GetScrollPos
GetMessagePos
BeginDeferWindowPos
IsWindowEnabled
GetMenuState
GetDlgItem
CreateIcon
DispatchMessageA
GetWindow
SetTimer
GetSysColor
GetMenuItemInfoA
FrameRect
EqualRect
CreateMenu
MessageBoxA
BeginPaint
GetIconInfo
TrackPopupMenu
FindWindowA
ShowScrollBar
GetLastActivePopup
GetParent
GetDC
EnumThreadWindows
IsChild
GetCapture
CharToOemA
CallNextHookEx
SetWindowLongA
RegisterClassA
GetSysColorBrush
IsWindowVisible
DispatchMessageW
GetMenuItemCount
GetMenuStringA
GetWindowTextA
shell32
SHGetDesktopFolder
SHGetFolderPathA
SHFileOperationA
SHGetDiskFreeSpaceA
DragQueryFileA
kernel32
VirtualAlloc
FormatMessageA
GetThreadLocale
GetLocaleInfoA
CreateThread
CompareStringA
GetModuleHandleA
LocalFree
GetLocalTime
GlobalDeleteAtom
GetProcessHeap
FindResourceA
GetCurrentProcess
GetCurrentProcessId
FindClose
GetCurrentThread
lstrlenA
GetFileAttributesA
GetFileType
CreateFileA
InitializeCriticalSection
ExitProcess
SizeofResource
WriteFile
lstrcmpA
FreeLibrary
GetCPInfo
GetOEMCP
LoadLibraryA
GetStdHandle
SetLastError
SetEvent
DeleteFileA
WaitForSingleObject
GetStringTypeA
GetTickCount
LockResource
GetCurrentThreadId
CloseHandle
SetErrorMode
Sleep
VirtualQuery
LocalReAlloc
DeleteCriticalSection
VirtualAllocEx
lstrcmpiA
MoveFileA
lstrcpynA
FreeResource
SetThreadLocale
ResetEvent
LoadLibraryExA
ReadFile
GetUserDefaultLCID
HeapAlloc
GetCommandLineA
SetEndOfFile
LocalAlloc
ExitThread
EnterCriticalSection
GetStringTypeW
GetFileSize
msvcrt
log
memmove
memset
Sections
CODE Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tls Size: 4KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 119KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ