Static task
static1
Behavioral task
behavioral1
Sample
ee712f40c613e0f8f4dd38c45ff836d2666e15381f429a45967132970408744e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ee712f40c613e0f8f4dd38c45ff836d2666e15381f429a45967132970408744e.exe
Resource
win10v2004-20220901-en
General
-
Target
ee712f40c613e0f8f4dd38c45ff836d2666e15381f429a45967132970408744e
-
Size
154KB
-
MD5
a3658ea3662d1d34393c4b4954ac06e5
-
SHA1
78bafa6e003a758f46d4f37dcd84b9d877062ab9
-
SHA256
ee712f40c613e0f8f4dd38c45ff836d2666e15381f429a45967132970408744e
-
SHA512
738b05410d52b6c57d023b98c8ed01a521e77d0f417a4ee387085751f322f794b408506f7ec21623d50e8856854115a9b7dfe8f814fbda0dc8eb8a9ed3bb88a1
-
SSDEEP
3072:XF1cxpdVJ1ADuytEHGtrFiJeXaZe/dGJvArubrcii49bzIVHj:1SpXJCeGtrrXagWvNbrcZizIRj
Malware Config
Signatures
Files
-
ee712f40c613e0f8f4dd38c45ff836d2666e15381f429a45967132970408744e.exe windows x86
6725d62f04c36da3de4f781d1fb925cb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
IsCharAlphaNumericW
EndDialog
SetWindowPos
GetActiveWindow
SetWindowTextA
OemKeyScan
DialogBoxParamA
SetPropA
EnumDesktopsA
ole32
CoFreeLibrary
CoUnmarshalHresult
OleFlushClipboard
kernel32
GetCurrentThreadId
CopyFileW
CreateProcessW
GetStartupInfoA
HeapDestroy
HeapFree
DeleteAtom
LocalAlloc
InitializeSListHead
LocalFree
AddAtomW
InterlockedExchangeAdd
GetProcAddress
LoadLibraryExW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
HeapCreate
Sections
.text Size: 139KB - Virtual size: 139KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ