?CreateDlgMessage@@YGHPAXPADK|U
Static task
static1
Behavioral task
behavioral1
Sample
b851b1b9939e9c42e09c9cd1b2bc20adf243c95ebbe7e17810bd3893ee112ec4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b851b1b9939e9c42e09c9cd1b2bc20adf243c95ebbe7e17810bd3893ee112ec4.exe
Resource
win10v2004-20221111-en
General
-
Target
b851b1b9939e9c42e09c9cd1b2bc20adf243c95ebbe7e17810bd3893ee112ec4
-
Size
166KB
-
MD5
6e634ff250bd01f709982bd9b3b625d0
-
SHA1
31a43aba0172be9835d4c478c41b04756989c541
-
SHA256
b851b1b9939e9c42e09c9cd1b2bc20adf243c95ebbe7e17810bd3893ee112ec4
-
SHA512
499619ec71d9509d7d198f1cd0bebbbf947970e30c9ba3b3cf174995519e62d332f5fee857e3274ded5a19f678bd6af077949ab1f0532baeade890b0341a230f
-
SSDEEP
3072:JGX8qcHDjFPOkd8pcQuK4l6Ln1u8szX1FRtE6zNBSxz32l9WFXc4Y0nA:VHDjh9dLtA15yjxzNBSBGlz4L
Malware Config
Signatures
Files
-
b851b1b9939e9c42e09c9cd1b2bc20adf243c95ebbe7e17810bd3893ee112ec4.exe windows x86
30db2ce1ab6f1ed00c145119f0bd6a64
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DestroyAcceleratorTable
InvalidateRect
TranslateMessage
wsprintfW
SetScrollInfo
LoadIconA
MapWindowPoints
GetDC
shlwapi
ChrCmpIW
UrlGetLocationW
msvcrt
_controlfp
atol
__set_app_type
_wtoi
strerror
__p__fmode
__p__commode
_amsg_exit
_initterm
_ismbblead
gets
_XcptFilter
_exit
_cexit
__setusermatherr
__getmainargs
memset
kernel32
IsBadReadPtr
GetCommProperties
SetTimerQueueTimer
lstrcmpiW
GetModuleFileNameA
GetSystemDirectoryW
lstrlenA
LoadLibraryA
gdi32
GetRgnBox
CreatePenIndirect
EndPage
GetObjectW
CreateRoundRectRgn
BeginPath
Exports
Exports
Sections
.text Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.irdat Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 136KB - Virtual size: 394KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE