Static task
static1
Behavioral task
behavioral1
Sample
65570899ae5cc7215be4c784a361d8fdff96a47f7178dc9b5e9089c29b9ea893.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
65570899ae5cc7215be4c784a361d8fdff96a47f7178dc9b5e9089c29b9ea893.exe
Resource
win10v2004-20220901-en
General
-
Target
65570899ae5cc7215be4c784a361d8fdff96a47f7178dc9b5e9089c29b9ea893
-
Size
305KB
-
MD5
2095811f999104e6770f2e0a2ae67e86
-
SHA1
38f0c81f228e9d05a55b86333dfe6d4cdbf5e34b
-
SHA256
65570899ae5cc7215be4c784a361d8fdff96a47f7178dc9b5e9089c29b9ea893
-
SHA512
8a11955f83198cfe1e657b12480656893a5dd33e6d34f56bbba1e366a9a902260987ea6c8382828e0b041fb4d806ad4d6e1c44453b5d61c6c098681d85d9c76d
-
SSDEEP
6144:z3oBeVp/2724yVaE0tfRW+vM5ZJvKBG4WoQs9jU:7o7yd0tfRjvMIGnoQs9jU
Malware Config
Signatures
Files
-
65570899ae5cc7215be4c784a361d8fdff96a47f7178dc9b5e9089c29b9ea893.exe windows x86
ea36016da2f84c304ef946a035f8ce34
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCreate
GetPrivateProfileStringA
LoadLibraryW
LocalFlags
GetNumberFormatA
CreateEventW
InitializeCriticalSection
TlsGetValue
LocalFree
lstrlenW
GetDriveTypeW
GetConsoleAliasA
ResumeThread
FindClose
GetCurrentProcessId
GetCurrentThreadId
ReadFile
FindAtomA
SuspendThread
GetEnvironmentVariableW
user32
DrawTextA
IsWindow
GetSysColor
SetFocus
GetKeyboardType
GetClassInfoA
CallWindowProcW
CreateWindowExA
DispatchMessageA
DrawStateW
GetSysColor
GetClientRect
EndDialog
stclient
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
ntshrui
IsPathSharedA
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ