IySJEyEVFW_R4@20
Static task
static1
Behavioral task
behavioral1
Sample
d1f218f6537a44d64b45b038d4d54467b4011be6ec809323d17bc573b1b67427.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d1f218f6537a44d64b45b038d4d54467b4011be6ec809323d17bc573b1b67427.exe
Resource
win10v2004-20220901-en
General
-
Target
d1f218f6537a44d64b45b038d4d54467b4011be6ec809323d17bc573b1b67427
-
Size
67KB
-
MD5
d46e8531428b5bd5c778a2bb477b6dc0
-
SHA1
468b7b080b1003b2c226ddc3479fdd38ecae486b
-
SHA256
d1f218f6537a44d64b45b038d4d54467b4011be6ec809323d17bc573b1b67427
-
SHA512
c92980604512a91e5519cdc1ed5b8e76def24780d8e1c4a9b7f2ca1c440186e61d60bc158768a84d99c12737f559d3541f5a8b673b2161fdd71990ab721513c1
-
SSDEEP
1536:bhSoNcLhPf4WaWD1u3MlmlnjXemjRH8fY8yeB:KRf4je1u8onSmlcfNye
Malware Config
Signatures
Files
-
d1f218f6537a44d64b45b038d4d54467b4011be6ec809323d17bc573b1b67427.exe windows x86
da1d15f15987e7f4df49dcb497178faf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetBkMode
GetTextAlign
CreateCompatibleDC
CreateBrushIndirect
GetTextColor
CreatePalette
CreateDIBitmap
GetDIBColorTable
GetClipBox
GetObjectA
user32
MsgWaitForMultipleObjects
DestroyMenu
DrawIcon
GetIconInfo
SetPropA
IsDialogMessageA
GetMenuItemInfoA
GetClassNameA
DrawAnimatedRects
GetWindowLongA
DeleteMenu
SetRect
EnableMenuItem
LoadCursorA
MessageBoxA
InsertMenuA
GetWindowTextLengthA
GetMenuItemID
CharLowerA
InsertMenuItemA
GetCursor
GetParent
IsCharUpperA
GetDesktopWindow
CreatePopupMenu
SetFocus
GetCapture
PostQuitMessage
CharUpperBuffA
GetClipboardData
SetWindowLongA
GetDC
SetScrollPos
GetWindowRect
GetSystemMenu
DefFrameProcA
RegisterClipboardFormatA
PostMessageA
GetPropA
CallNextHookEx
LoadStringA
KillTimer
GetMenu
WaitMessage
EndPaint
SetParent
LoadBitmapA
CharNextA
SetScrollInfo
EnumChildWindows
EqualRect
RedrawWindow
WindowFromPoint
GetKeyboardState
GetMessagePos
SetWindowLongW
DestroyCursor
GetMenuStringA
DrawTextA
SetWindowsHookExA
GetWindow
GetWindowLongW
EnumThreadWindows
IsCharLowerA
GetMenuState
kernel32
GetThreadLocale
SetErrorMode
Sleep
lstrlenA
ExitThread
IsBadReadPtr
WriteFile
GlobalAddAtomA
ReadFile
GetProcessHeap
EnumCalendarInfoA
GetACP
GetLastError
FreeResource
GetModuleHandleW
GetFullPathNameA
VirtualQuery
GetDateFormatA
FindClose
GetCurrentThreadId
LoadLibraryA
CloseHandle
MoveFileExA
SetEndOfFile
GetOEMCP
GetLocalTime
SetFilePointer
GetFileAttributesA
LocalReAlloc
CompareStringA
HeapDestroy
DeleteFileA
FormatMessageA
GetFileType
ResetEvent
VirtualAllocEx
GetVersionExA
lstrlenW
GetCurrentProcess
lstrcpynA
GetTickCount
FindFirstFileA
lstrcpyA
FindResourceA
DeleteCriticalSection
VirtualAlloc
RaiseException
GetStdHandle
ExitProcess
GetSystemDefaultLangID
CreateEventA
LocalAlloc
LockResource
SetEvent
GetCommandLineA
GetProcAddress
MulDiv
VirtualFree
GetStartupInfoA
CreateThread
MoveFileA
EnterCriticalSection
GetCommandLineW
GlobalFindAtomA
SetHandleCount
shlwapi
SHSetValueA
PathFileExistsA
SHDeleteValueA
SHDeleteKeyA
PathIsDirectoryA
PathIsContentTypeA
Exports
Exports
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ