Static task
static1
Behavioral task
behavioral1
Sample
a4f3ec614818a2a650c196862bc1c2903f1b8a7c8ab934b8c3b5b17145347752.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a4f3ec614818a2a650c196862bc1c2903f1b8a7c8ab934b8c3b5b17145347752.exe
Resource
win10v2004-20221111-en
General
-
Target
a4f3ec614818a2a650c196862bc1c2903f1b8a7c8ab934b8c3b5b17145347752
-
Size
340KB
-
MD5
8f99bf133cc047322c3eb92cc02e9cbe
-
SHA1
aa14be7f4352151d85e54f6ab76e71431b593736
-
SHA256
a4f3ec614818a2a650c196862bc1c2903f1b8a7c8ab934b8c3b5b17145347752
-
SHA512
1c84018aefa7a1ee147d45789062ad2ef8d889fa1489620f125d38e7436327ef0ae8e9066341e8085350446e77d2321df6d75122512bf896752b68ccc44de5e4
-
SSDEEP
6144:SktRhsQbqhtONkYWiJ58I1YSXHUG6lv1CfOD+qS2ylusCCeeXFFJWnUhwgfi9mF0:SasmKOCm3UG6ldCvVceV6UhwAaIg3np
Malware Config
Signatures
Files
-
a4f3ec614818a2a650c196862bc1c2903f1b8a7c8ab934b8c3b5b17145347752.exe windows x86
687c3fdcddaecda4745570deacff0658
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
FindClose
GetDriveTypeA
GlobalUnlock
MapViewOfFile
GetConsoleCP
GlobalLock
GetLastError
LocalFree
GetModuleHandleA
CreateFileA
lstrlenA
CreateEventA
IsBadReadPtr
CloseHandle
HeapCreate
GetStdHandle
GetCPInfo
FreeEnvironmentStringsA
LoadLibraryExA
user32
DialogBoxParamA
CheckMenuItem
GetMessageA
GetDlgItem
RedrawWindow
SetFocus
ClipCursor
GetDlgItemTextA
IsMenu
EndDialog
GetParent
CreateWindowExA
GetSubMenu
DrawIconEx
apphelp
ApphelpShowDialog
SdbCloseDatabase
ApphelpCheckIME
ApphelpCheckRunApp
SdbFindFirstTag
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ