Static task
static1
Behavioral task
behavioral1
Sample
d543110ff6bf97dae30eecfb3f0accbfdf6d3e5fc8c1c80c9cc0e65fffcf69fc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d543110ff6bf97dae30eecfb3f0accbfdf6d3e5fc8c1c80c9cc0e65fffcf69fc.exe
Resource
win10v2004-20220901-en
General
-
Target
d543110ff6bf97dae30eecfb3f0accbfdf6d3e5fc8c1c80c9cc0e65fffcf69fc
-
Size
197KB
-
MD5
cb609612204934272798766f4a3010c4
-
SHA1
86922824652dbff4e068803e67a3c8f4307341b2
-
SHA256
d543110ff6bf97dae30eecfb3f0accbfdf6d3e5fc8c1c80c9cc0e65fffcf69fc
-
SHA512
b091742aa21a19a0c52ac326bfff54ea7476c05847f9849d49bfbb30ef182763ff4403e57b59727b6fc26d6e5ebf685f92488d904951760899f62a2195d0fd73
-
SSDEEP
3072:16mbLak83qs4CjoYru8M+2noreFjlyAfuFbwXmRRkl0XxThtOX5iI8yDbuCjm:QafCkYgnEeF0kuFVRc0X5O59DbuCjm
Malware Config
Signatures
Files
-
d543110ff6bf97dae30eecfb3f0accbfdf6d3e5fc8c1c80c9cc0e65fffcf69fc.exe windows x86
2ef87b6e2ee9833f3cd424efb044af42
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
RealizePalette
GetDIBColorTable
UnrealizeObject
IntersectClipRect
CreateDIBSection
CreateDCW
SetWindowExtEx
SetRectRgn
SetBkMode
GetObjectA
CreateFontIndirectA
GetTextExtentPoint32A
CreateICW
StartDocW
SetWindowOrgEx
DPtoLP
SetTextColor
GetCharWidth32W
EnumFontFamiliesW
GetDIBits
oleaut32
OleIconToCursor
user32
DefDlgProcA
GetMenuItemRect
RegisterHotKey
CheckDlgButton
ShowWindowAsync
RegisterClassW
TranslateAcceleratorA
EndDialog
SetCaretPos
DrawEdge
CreateDialogParamA
FrameRect
GetUpdateRect
GetDC
DefWindowProcW
ModifyMenuW
WaitForInputIdle
PostThreadMessageA
TranslateMessage
InsertMenuItemW
FindWindowExW
DrawTextA
GetClassLongA
BeginPaint
GetMenuStringA
SendMessageTimeoutW
IsCharAlphaNumericW
GetDialogBaseUnits
SendMessageW
DialogBoxParamW
SetFocus
LoadBitmapW
GetClassInfoExW
InvalidateRgn
CreateDialogParamW
GetDCEx
GetCaretPos
DestroyAcceleratorTable
wvsprintfW
IsCharAlphaW
GetClassNameW
SetMenuDefaultItem
SetSysColors
RedrawWindow
CheckRadioButton
CharToOemW
ShowCursor
SetActiveWindow
TrackPopupMenu
GetAsyncKeyState
DestroyIcon
advapi32
RegDeleteValueA
RegSetValueExW
CryptDestroyKey
RegSetValueExA
NotifyBootConfigStatus
RegCloseKey
kernel32
GlobalReAlloc
SetErrorMode
CompareStringA
lstrcpyA
DuplicateHandle
SetThreadAffinityMask
LoadLibraryW
SetLocalTime
SystemTimeToFileTime
DeleteCriticalSection
SetHandleCount
QueryPerformanceCounter
GetFileType
EnumResourceTypesA
GlobalGetAtomNameW
CreateNamedPipeA
GetLocaleInfoA
GetModuleFileNameA
LocalSize
ClearCommBreak
FindFirstFileA
GetNumberFormatA
Sections
.text Size: 182KB - Virtual size: 181KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.psikif Size: 512B - Virtual size: 424B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.yid Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pox Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hob Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Kuduag Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.refee Size: 512B - Virtual size: 231B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ