Static task
static1
Behavioral task
behavioral1
Sample
c68a201ac0ada56254b9611bf2f716434691c1cd92fbd7383bbbe92b741d953b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c68a201ac0ada56254b9611bf2f716434691c1cd92fbd7383bbbe92b741d953b.exe
Resource
win10v2004-20221111-en
General
-
Target
c68a201ac0ada56254b9611bf2f716434691c1cd92fbd7383bbbe92b741d953b
-
Size
80KB
-
MD5
f5ff317f20a84225939230e25e125d7a
-
SHA1
64b604eb6335c5c228f15661a0d7d971661e7f7c
-
SHA256
c68a201ac0ada56254b9611bf2f716434691c1cd92fbd7383bbbe92b741d953b
-
SHA512
483dec3e33a54da43d6f6c6d505d30f1f662b117681e8c33250aecba37edcfc38d98ea6378e1e0e3451a06028d0dde58d7cb1aa3779fb16eee4512ccab31c276
-
SSDEEP
1536:FJdUT+SGwTe8ZTxU7qQeV5+sbUej/Dd4MB359+73/m9w1NaJfK6O:jGiLfadU7rsbUejiMF5Y73/mWNok
Malware Config
Signatures
Files
-
c68a201ac0ada56254b9611bf2f716434691c1cd92fbd7383bbbe92b741d953b.exe windows x86
b640340a52524836e16ab88cbacd7cd7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
UnhookWindowsHookEx
EnableMenuItem
GetScrollPos
EqualRect
SetWindowTextA
SetWindowPos
GetSysColorBrush
GetSysColor
GetMessageA
EnumWindows
PostQuitMessage
GetSubMenu
FrameRect
kernel32
RtlUnwind
ExitProcess
GetACP
GetCurrentProcessId
GetOEMCP
GetFileAttributesA
GetTimeZoneInformation
VirtualAllocEx
GetTickCount
FileTimeToSystemTime
GetThreadLocale
GetStartupInfoA
GetSystemTime
InterlockedExchange
SetUnhandledExceptionFilter
GetTempPathA
gdi32
SetViewportExtEx
DPtoLP
SelectClipPath
FillRgn
CreateCompatibleBitmap
GetMapMode
CopyEnhMetaFileA
ExcludeClipRect
CreateICW
ole32
CoInitialize
CoRevokeClassObject
CoCreateInstance
StringFromGUID2
OleRun
CoTaskMemRealloc
CoInitializeSecurity
DoDragDrop
StgOpenStorage
advapi32
CryptHashData
RegQueryValueExW
FreeSid
AdjustTokenPrivileges
GetSecurityDescriptorDacl
CheckTokenMembership
RegCreateKeyA
QueryServiceStatus
RegCreateKeyExW
GetUserNameA
msvcrt
strcspn
fflush
signal
__setusermatherr
iswspace
_strdup
_fdopen
fprintf
__getmainargs
raise
strlen
_flsbuf
_mbscmp
__initenv
_CIpow
_lock
strncpy
puts
comctl32
ImageList_DragEnter
ImageList_SetIconSize
CreatePropertySheetPageA
ImageList_GetBkColor
ImageList_ReplaceIcon
ImageList_DrawEx
ImageList_LoadImageW
InitCommonControls
ImageList_Destroy
ImageList_Write
ImageList_LoadImageA
ImageList_GetIcon
ImageList_GetIconSize
shell32
DragQueryFileA
ShellExecuteW
SHGetPathFromIDList
SHBrowseForFolderA
DragQueryFileW
DragAcceptFiles
ExtractIconW
ExtractIconExW
ShellExecuteEx
DoEnvironmentSubstW
CommandLineToArgvW
oleaut32
SafeArrayPtrOfIndex
SafeArrayUnaccessData
SafeArrayPutElement
SafeArrayRedim
SafeArrayGetUBound
SysReAllocStringLen
SafeArrayCreate
VariantCopy
Sections
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE