Static task
static1
Behavioral task
behavioral1
Sample
b57c6c1410224f8a5eb5106d591b088eeeca6bf66879ad793f8853d96ec4d2a2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b57c6c1410224f8a5eb5106d591b088eeeca6bf66879ad793f8853d96ec4d2a2.exe
Resource
win10v2004-20221111-en
General
-
Target
b57c6c1410224f8a5eb5106d591b088eeeca6bf66879ad793f8853d96ec4d2a2
-
Size
154KB
-
MD5
69695bca43018d376099cb53743598f5
-
SHA1
73658f43132522f5e3196c2566e3cce3807f169f
-
SHA256
b57c6c1410224f8a5eb5106d591b088eeeca6bf66879ad793f8853d96ec4d2a2
-
SHA512
e754f829fa38cf61980050f673fe6fa9d42c3cf849e4a4a04436687b7a237a577d1c466b3a125f6a69ba3638c22b64d35069452682f8ba6741c7388145838aa4
-
SSDEEP
3072:/G+gEfpC46JbsN7mwEbJJa1445ol3S/IS7uiMIcKjRA4:Zx6JbsN7EbrSAGKk1
Malware Config
Signatures
Files
-
b57c6c1410224f8a5eb5106d591b088eeeca6bf66879ad793f8853d96ec4d2a2.exe windows x86
54968207b857becb04fc87cb4aac99ba
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetStockObject
user32
SetWindowLongA
SetWindowTextA
CreateWindowExA
SetForegroundWindow
TranslateMessage
UpdateWindow
SendMessageA
RegisterClassExA
PostQuitMessage
LoadIconA
LoadCursorA
GetWindowTextLengthA
GetWindowTextA
GetSystemMetrics
GetMessageA
GetDlgItem
GetDlgCtrlID
EnableWindow
DispatchMessageA
ShowWindow
DefWindowProcA
CallWindowProcA
SetWindowWord
kernel32
FlushFileBuffers
CreateFileA
CloseHandle
VirtualProtect
Sleep
RtlZeroMemory
LoadLibraryA
GetModuleHandleA
GetLastError
GetCurrentDirectoryA
GetCommandLineA
ExitProcess
CreateThread
WriteFile
comdlg32
GetSaveFileNameA
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 149KB - Virtual size: 149KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE