Static task
static1
Behavioral task
behavioral1
Sample
c03517dcff37a72f15194063d4dc55ad107127a370f99f313dc4323d65c7156a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c03517dcff37a72f15194063d4dc55ad107127a370f99f313dc4323d65c7156a.exe
Resource
win10v2004-20221111-en
General
-
Target
c03517dcff37a72f15194063d4dc55ad107127a370f99f313dc4323d65c7156a
-
Size
81KB
-
MD5
ed2ae14150709f2aaf81332a90205b71
-
SHA1
02c090710287eae4b1ce2482120b9d121b1bbf5d
-
SHA256
c03517dcff37a72f15194063d4dc55ad107127a370f99f313dc4323d65c7156a
-
SHA512
f30a2e86996da4eaff267b162490c104ca7427c595e25bcce14a64c6242c5f91c1888fa4aa82190a23fa4b3c34106e88354d48edb8e8ff3c83d7aed4b061cdae
-
SSDEEP
1536:QWEhGsWPJdLeBbA2a9Dpbm9kmySxhVYWG/Tex94Icx3/58uO5E8p3:TEhroL2boVboZdxwWrx9038P5X
Malware Config
Signatures
Files
-
c03517dcff37a72f15194063d4dc55ad107127a370f99f313dc4323d65c7156a.exe windows x86
9969dfbb52ffd80990e172c98ad62f71
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
SetWindowTextA
GetScrollPos
EnableMenuItem
FrameRect
GetSubMenu
EnumWindows
SetWindowPos
UnhookWindowsHookEx
GetSysColorBrush
PostQuitMessage
EqualRect
GetSysColor
GetMessageA
kernel32
GetACP
RtlUnwind
FileTimeToSystemTime
InterlockedExchange
GetFileAttributesA
VirtualAllocEx
GetCurrentProcessId
GetSystemTime
ExitProcess
GetThreadLocale
GetStartupInfoA
GetTempPathA
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetOEMCP
GetTimeZoneInformation
gdi32
FillRgn
SetViewportExtEx
ExcludeClipRect
DPtoLP
SelectClipPath
GetMapMode
CopyEnhMetaFileA
CreateCompatibleBitmap
CreateICW
ole32
CoInitialize
DoDragDrop
StringFromGUID2
CoTaskMemRealloc
CoInitializeSecurity
CoRevokeClassObject
CoCreateInstance
StgOpenStorage
OleRun
advapi32
AdjustTokenPrivileges
RegCreateKeyExW
GetUserNameA
QueryServiceStatus
RegQueryValueExW
GetSecurityDescriptorDacl
RegCreateKeyA
CryptHashData
FreeSid
CheckTokenMembership
msvcrt
_CIpow
fflush
signal
__getmainargs
puts
fprintf
__setusermatherr
strcspn
_mbscmp
_fdopen
_strdup
strlen
raise
__initenv
_lock
iswspace
_flsbuf
strncpy
comctl32
InitCommonControls
CreatePropertySheetPageA
ImageList_GetBkColor
ImageList_GetIcon
ImageList_SetIconSize
ImageList_LoadImageA
ImageList_GetIconSize
ImageList_Write
ImageList_LoadImageW
ImageList_Destroy
ImageList_DragEnter
ImageList_ReplaceIcon
ImageList_DrawEx
shell32
SHGetPathFromIDList
DoEnvironmentSubstW
ShellExecuteW
SHBrowseForFolderA
ExtractIconExW
ExtractIconW
CommandLineToArgvW
ShellExecuteEx
DragQueryFileW
DragAcceptFiles
DragQueryFileA
oleaut32
VariantCopy
SafeArrayPtrOfIndex
SafeArrayGetUBound
SysReAllocStringLen
SafeArrayUnaccessData
SafeArrayRedim
SafeArrayCreate
SafeArrayPutElement
Sections
.text Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ougkakg Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE