Static task
static1
Behavioral task
behavioral1
Sample
62f5bdfa5b13ce1e8c1e4cc0c74cf7addb09be153903fedbdb14a90c19120492.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
62f5bdfa5b13ce1e8c1e4cc0c74cf7addb09be153903fedbdb14a90c19120492.exe
Resource
win10v2004-20221111-en
General
-
Target
62f5bdfa5b13ce1e8c1e4cc0c74cf7addb09be153903fedbdb14a90c19120492
-
Size
167KB
-
MD5
0c9b2814ece8f65df5a4bb5f9014fd24
-
SHA1
5256ad96a27928c8ce405b302e490891b34821d9
-
SHA256
62f5bdfa5b13ce1e8c1e4cc0c74cf7addb09be153903fedbdb14a90c19120492
-
SHA512
ece208cd91e93994e41dc246eacf0e35568da58c59ee22a0b73d905b169ac9e34d388bad338f770e415af86a209a720427e54946bbea0a9e7b0785d47f4f8ee6
-
SSDEEP
3072:yPGktEv19GOwUXULn88UFeTm+CX3iLJ0WzeKmp+S4Wua8Q7pL:cuntkrIxFyCWzeKMx7p
Malware Config
Signatures
Files
-
62f5bdfa5b13ce1e8c1e4cc0c74cf7addb09be153903fedbdb14a90c19120492.exe windows x86
89f16ee0b0a1e7accfa893528879ef42
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
GetTempPathW
CreateFileW
GetFileType
GetModuleHandleA
LoadLibraryA
GetStartupInfoA
CreateFileA
GetModuleHandleW
GetTempPathA
FindClose
user32
CloseClipboard
GetWindow
BeginPaint
ChangeDisplaySettingsA
ChangeDisplaySettingsW
GetWindowRect
gdi32
DeleteObject
DeleteDC
GetDeviceCaps
oleaut32
SysAllocString
SetErrorInfo
msvcrt
exit
_controlfp
_except_handler3
__set_app_type
__p__commode
_adjust_fdiv
strlen
strcmp
strstr
_exit
_XcptFilter
__setusermatherr
_acmdln
__getmainargs
_initterm
__p__fmode
Sections
.text Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE