Static task
static1
Behavioral task
behavioral1
Sample
c814007655ba038df6019bc0a63873d463cbeca15c09c4d7d593d7d93657c011.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c814007655ba038df6019bc0a63873d463cbeca15c09c4d7d593d7d93657c011.exe
Resource
win10v2004-20221111-en
General
-
Target
c814007655ba038df6019bc0a63873d463cbeca15c09c4d7d593d7d93657c011
-
Size
204KB
-
MD5
1449ee3bfbea0adce19152ccac67615e
-
SHA1
d20d26021ffdcba045ff9c2e34eb4527ad30bd71
-
SHA256
c814007655ba038df6019bc0a63873d463cbeca15c09c4d7d593d7d93657c011
-
SHA512
f131c5ab8e8be09017fdd1ec584ff4522452ba4ae97bf8e3bc6ccd7e327dc4faf56840147bd417aa9d07090caaee5d538598259399c0265926d4e70a2a447cf3
-
SSDEEP
6144:1FskRMsa7tgYauP+lkqAoR/f5bdzzHsXeaqcDh:YkRM75gMWkcN5S0cDh
Malware Config
Signatures
Files
-
c814007655ba038df6019bc0a63873d463cbeca15c09c4d7d593d7d93657c011.exe windows x86
c768b38e1432343fe847d902bd09985f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
FindAtomA
GetNumberFormatA
LocalFree
GetCurrentProcessId
CreateEventW
SetLastError
GetPrivateProfileStringA
EnumCalendarInfoA
HeapCreate
GetModuleHandleA
LocalFlags
FindClose
GetConsoleAliasA
GetDriveTypeW
EnterCriticalSection
lstrlenW
ReadFile
TlsGetValue
ResumeThread
user32
IsWindow
DispatchMessageA
GetKeyState
GetCursorInfo
GetClientRect
DrawTextA
SetFocus
GetMenuInfo
GetSysColor
CallWindowProcW
GetKeyboardType
DispatchMessageA
GetClassInfoA
stclient
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
ntshrui
IsPathSharedA
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 492KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 359KB - Virtual size: 358KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ