Static task
static1
Behavioral task
behavioral1
Sample
c245378b4a30e07ab318cf93f53616de611d766e5e3d2bd943eb70fd7cb8b427.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c245378b4a30e07ab318cf93f53616de611d766e5e3d2bd943eb70fd7cb8b427.exe
Resource
win10v2004-20221111-en
General
-
Target
c245378b4a30e07ab318cf93f53616de611d766e5e3d2bd943eb70fd7cb8b427
-
Size
269KB
-
MD5
c4045052d82112e461cc57dfe735c858
-
SHA1
4c2c831b2ca016938079e3afc17af4f90d4e4b7b
-
SHA256
c245378b4a30e07ab318cf93f53616de611d766e5e3d2bd943eb70fd7cb8b427
-
SHA512
6e885f9331956d18bb24b6b7e8f58a173154147427b2a470210bf4086dbd761266577a397dc80d42f56c09b1f97229e38be474b3292a9b564a8d8099cedf2a0f
-
SSDEEP
6144:E0PGQmcQF9Rq9kLhS6NxmWkrFmfiiIKynSJGK:EK4l9RZLhFNZ7fixU7
Malware Config
Signatures
Files
-
c245378b4a30e07ab318cf93f53616de611d766e5e3d2bd943eb70fd7cb8b427.exe windows x86
b765dbaebd6f6c3f2ac0bc31450d7cda
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EnableScrollBar
GetCursorPos
DrawIconEx
SetWindowPos
IsWindowVisible
GetDCEx
DispatchMessageA
DrawTextA
ClientToScreen
DrawMenuBar
ShowScrollBar
GetWindow
GetIconInfo
CharLowerA
MessageBoxA
CreatePopupMenu
TrackPopupMenu
GetActiveWindow
EnableMenuItem
GetWindowTextA
CallNextHookEx
GetScrollInfo
DrawEdge
RegisterClassA
EnumThreadWindows
GetSysColorBrush
GetLastActivePopup
EndPaint
GetDlgItem
GetScrollPos
EndDeferWindowPos
GetMenu
GetSubMenu
SetTimer
EnumWindows
GetScrollRange
GetDC
SetCursor
BeginPaint
GetDesktopWindow
DrawFrameControl
IsMenu
CreateWindowExA
EqualRect
HideCaret
FindWindowA
DispatchMessageW
FillRect
GetClipboardData
GetPropA
GetMenuItemInfoA
GetSysColor
SystemParametersInfoA
SetWindowLongA
FrameRect
msvcrt
memcpy
calloc
strcmp
cos
memmove
kernel32
LoadLibraryA
GlobalAlloc
WriteFile
GetFullPathNameA
FormatMessageA
GetTickCount
CloseHandle
RaiseException
ExitProcess
CreateFileA
FreeLibrary
GetCPInfo
FindClose
EnumCalendarInfoA
SetLastError
GetFileAttributesA
GetFileType
MoveFileA
GetVersionExA
GetVersion
SetEvent
HeapFree
MoveFileExA
LockResource
GetACP
GetStartupInfoA
FindResourceA
GetProcessHeap
GlobalDeleteAtom
VirtualFree
GetUserDefaultLCID
CompareStringA
LocalAlloc
DeleteFileA
VirtualQuery
SizeofResource
SetEndOfFile
HeapAlloc
ExitThread
GetStdHandle
GetLastError
GetThreadLocale
GlobalAddAtomA
GetCommandLineA
LocalFree
CreateEventA
VirtualAllocEx
GetCurrentThreadId
VirtualAlloc
FindFirstFileA
GetCurrentProcessId
GetModuleHandleA
GetCurrentProcess
InitializeCriticalSection
SetErrorMode
GetCurrentThread
GetFileSize
MulDiv
GetDiskFreeSpaceA
ReadFile
ResetEvent
lstrcpyA
lstrcatA
GetModuleFileNameA
SetHandleCount
SetFilePointer
GetLocalTime
LoadResource
LocalReAlloc
lstrlenA
GetStringTypeA
Sections
.text Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.init Size: 211KB - Virtual size: 210KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 457B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE