Static task
static1
Behavioral task
behavioral1
Sample
8e4fd2e22b220f287144d5a92ab616e42b74ccf7f8a7db2d16d10b3bebc8f441.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8e4fd2e22b220f287144d5a92ab616e42b74ccf7f8a7db2d16d10b3bebc8f441.exe
Resource
win10v2004-20221111-en
General
-
Target
8e4fd2e22b220f287144d5a92ab616e42b74ccf7f8a7db2d16d10b3bebc8f441
-
Size
177KB
-
MD5
13c0c877d7e8c047c5edd58e7c442e67
-
SHA1
13690c9cb6a1a818db525b601eeff1f1b4c54d93
-
SHA256
8e4fd2e22b220f287144d5a92ab616e42b74ccf7f8a7db2d16d10b3bebc8f441
-
SHA512
9553b7e18f29dbb0727d62afbae19bc86e034debec081275426f335f7811cc99d7e401ef66fd5b9d87e2030c9b431da0948124e0a63b36c1cb5f177e2e971438
-
SSDEEP
3072:9eoESzDu+DNJfqsOKejIZLLEjviRCln4Z0ZQ1RurrLxMKJZSJ4mY/LqDAfhEKkhO:QtSzDVZ9mKejIZ2vICqOK1RurBMwZSJE
Malware Config
Signatures
Files
-
8e4fd2e22b220f287144d5a92ab616e42b74ccf7f8a7db2d16d10b3bebc8f441.exe windows x86
10ec2e2888449106b79c058347dff8bc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
IsCharAlphaW
EnumChildWindows
MoveWindow
SetWindowTextA
IsCharLowerA
GetDesktopWindow
DialogBoxParamA
SetWindowLongW
GetActiveWindow
ole32
CoRevokeClassObject
CoEnableCallCancellation
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
kernel32
GetStartupInfoA
GetTickCount
HeapDestroy
HeapFree
SizeofResource
SetFileAttributesA
GetTimeZoneInformation
LocalAlloc
SuspendThread
LoadResource
FindResourceExA
GetDateFormatA
LoadLibraryA
FreeLibrary
GetProcAddress
DeleteCriticalSection
InitializeCriticalSection
LocalFree
IsBadStringPtrW
HeapCreate
Sections
.text Size: 163KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ