Static task
static1
Behavioral task
behavioral1
Sample
96351aaae0a61c43970daacb8982efd71916f0d537126b873c7801e360a13be5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
96351aaae0a61c43970daacb8982efd71916f0d537126b873c7801e360a13be5.exe
Resource
win10v2004-20220812-en
General
-
Target
96351aaae0a61c43970daacb8982efd71916f0d537126b873c7801e360a13be5
-
Size
171KB
-
MD5
348096b522c021a6f3e40ff455e39a41
-
SHA1
561afe1e704ac9032fd8e4e02976544cd1e91c21
-
SHA256
96351aaae0a61c43970daacb8982efd71916f0d537126b873c7801e360a13be5
-
SHA512
33de6c754d172515711a9e354b21a226deafa2b334791ad7cadf5aa4fa206cb4aee80b79a1dceae5f96db961461bbeb6adb9f8dd9b70bb911f8048d3f768932c
-
SSDEEP
3072:3sOIJpU8SKSZzFOAglm6xorLy4JQMlh6sm0mkJYxL:KVS//glp6jljmxi8
Malware Config
Signatures
Files
-
96351aaae0a61c43970daacb8982efd71916f0d537126b873c7801e360a13be5.exe windows x86
cafcbc083a1ecd396078b54f2e0f8940
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetDlgItem
BeginPaint
GetKeyState
LoadAcceleratorsA
DestroyWindow
SetFocus
DefWindowProcA
EndPaint
GetWindowRect
IntersectRect
ReleaseDC
MoveWindow
UnregisterClassA
SetWindowRgn
GetActiveWindow
OffsetRect
PtInRect
GetDC
CharNextA
SetWindowLongA
SetDlgItemTextA
EqualRect
SetParent
clusapi
CloseCluster
kernel32
LoadLibraryA
HeapFree
EnterCriticalSection
LoadResource
GetLongPathNameW
MultiByteToWideChar
lstrcpyA
DisableThreadLibraryCalls
GetFileAttributesA
GetWindowsDirectoryA
HeapReAlloc
SetThreadContext
lstrlenW
LockResource
lstrlenA
GetModuleFileNameA
lstrcatA
GetProcAddress
EnumResourceTypesA
InterlockedDecrement
FindResourceA
IsBadWritePtr
lstrcpynA
ExitProcess
GetProcessHeap
HeapAlloc
InterlockedIncrement
GetVersion
LeaveCriticalSection
WideCharToMultiByte
DeleteCriticalSection
InitializeCriticalSection
GetLocaleInfoA
Sections
.text Size: 98KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 1024B - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ