seOkjubrwT@12
Static task
static1
Behavioral task
behavioral1
Sample
f3c4640ec0136f451b654134a2621e14336201fcb68fc72bcd2e7414d96af7f5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f3c4640ec0136f451b654134a2621e14336201fcb68fc72bcd2e7414d96af7f5.exe
Resource
win10v2004-20221111-en
General
-
Target
f3c4640ec0136f451b654134a2621e14336201fcb68fc72bcd2e7414d96af7f5
-
Size
209KB
-
MD5
54c7881c3f56ec560c5646860b1d2bc0
-
SHA1
2286651e37dbdd47c8b9c11dc1960507a1ac967f
-
SHA256
f3c4640ec0136f451b654134a2621e14336201fcb68fc72bcd2e7414d96af7f5
-
SHA512
2196d76be000198793fabb8f5c2380a11e28f64a8d85b1ab7c53fbcfd69df670aac2c5ffc671d726b4f01b8050554db80ae5272ac73e7e03dd5125cddade20cb
-
SSDEEP
6144:/c0xRdOii86XLGstahmwju9eH8xxFzWf:E2RdOv8cGKejC9ecx/zi
Malware Config
Signatures
Files
-
f3c4640ec0136f451b654134a2621e14336201fcb68fc72bcd2e7414d96af7f5.exe windows x86
2b7d305af81e8c8b0f37f63ba16c7e2e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetWindowLongW
GetMenu
GetCapture
FindWindowA
FillRect
SetWindowPos
DrawEdge
IsCharLowerA
GetMenuState
DefMDIChildProcA
ClientToScreen
LoadStringA
MapWindowPoints
SetScrollPos
DefWindowProcA
EqualRect
CharUpperA
GetSystemMetrics
BeginPaint
SetActiveWindow
OpenIcon
LoadKeyboardLayoutA
MapVirtualKeyA
IsDialogMessageA
IsDlgButtonChecked
MsgWaitForMultipleObjects
EnumChildWindows
PtInRect
RedrawWindow
EmptyClipboard
TranslateMDISysAccel
GetWindowLongA
OemToCharA
DestroyIcon
GetKeyboardLayoutNameA
GetMenuItemInfoA
SetParent
DestroyCursor
FrameRect
GetKeyboardState
IsWindowUnicode
GetDC
CreateWindowExA
RegisterClipboardFormatA
InsertMenuA
CallNextHookEx
GetMenuStringA
GetSysColor
RegisterClassA
PostMessageA
LoadCursorA
PeekMessageA
DestroyMenu
GetTopWindow
GetWindowDC
UnregisterClassA
TrackPopupMenu
CreatePopupMenu
InvalidateRect
CharUpperBuffA
SetScrollInfo
kernel32
WideCharToMultiByte
MoveFileA
LocalFree
HeapAlloc
GetFileSize
CompareStringA
SetEndOfFile
GetCurrentProcess
GetCommandLineA
DeleteCriticalSection
RaiseException
FormatMessageA
HeapDestroy
FreeResource
GetDateFormatA
GetThreadLocale
SetHandleCount
GetTempPathA
MulDiv
SetFilePointer
LocalReAlloc
GetModuleHandleA
lstrcpyA
GetFullPathNameA
VirtualAlloc
GetProcAddress
GetProcessHeap
ExitThread
SetLastError
GetModuleFileNameA
CloseHandle
GetCPInfo
LoadLibraryA
FindFirstFileA
GetLocalTime
SetErrorMode
lstrcpynA
lstrcmpiA
GetModuleHandleW
ExitProcess
GetTickCount
VirtualFree
VirtualAllocEx
CreateThread
GetACP
FindResourceA
GetDiskFreeSpaceA
GetLocaleInfoA
Sleep
GlobalDeleteAtom
FreeLibrary
lstrlenA
GetStartupInfoA
WriteFile
MoveFileExA
GetFileAttributesA
GetVersionExA
CreateFileA
GetVersion
GlobalAddAtomA
GetEnvironmentStrings
LoadLibraryExA
comctl32
ImageList_Destroy
ImageList_Add
ImageList_Draw
ImageList_Remove
ImageList_DrawEx
ImageList_GetBkColor
ImageList_DragShowNolock
ImageList_Create
ImageList_Read
gdi32
GetBitmapBits
GetBkMode
CreateFontIndirectA
CreatePenIndirect
CopyEnhMetaFileA
GetRgnBox
CreatePalette
SelectPalette
Exports
Exports
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 190KB - Virtual size: 190KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ