Static task
static1
Behavioral task
behavioral1
Sample
b14df4c3d2f7441b56aa6f16753db04b3a80d8a230d38db7d7ad822140156acd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b14df4c3d2f7441b56aa6f16753db04b3a80d8a230d38db7d7ad822140156acd.exe
Resource
win10v2004-20221111-en
General
-
Target
b14df4c3d2f7441b56aa6f16753db04b3a80d8a230d38db7d7ad822140156acd
-
Size
167KB
-
MD5
12f3e8ebc0eca9d8347473c19988dfde
-
SHA1
6dd15d60a18272ee3bccd432b1445fb187170fbd
-
SHA256
b14df4c3d2f7441b56aa6f16753db04b3a80d8a230d38db7d7ad822140156acd
-
SHA512
a3753196d77840b44faf4407e6d17d52b1f7580f67d3f7d668490b1acc1aa56f7d25b47d790eee0149332055c83d13e73bcd4cc6b00442eb28791c633dcd2ceb
-
SSDEEP
768:AWSr9u8jO2N/Tyc1KFgb9Jfp2+kAkRwDy+Kta2pmXTBbAXrUobwyKFEma11bYCG3:G42nF9HGesa2mXTBboUAKFEJ1bYb4dE
Malware Config
Signatures
Files
-
b14df4c3d2f7441b56aa6f16753db04b3a80d8a230d38db7d7ad822140156acd.exe windows x86
4cd72716931436028a670e5b10c61253
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EnableMenuItem
RegisterClassExW
GetMessageW
GetWindowTextW
LoadMenuW
wsprintfW
CheckDlgButton
DialogBoxParamW
OffsetRect
ScreenToClient
PostMessageW
SetWindowTextW
GetClientRect
GetDlgItemTextW
SetRect
GetKeyState
GetCursorPos
SetWindowPos
RegisterClassW
GetSystemMenu
TranslateMessage
MessageBeep
CreateWindowExW
IsWindowVisible
wsprintfW
KillTimer
GetCursorPos
DispatchMessageA
DefWindowProcW
wsprintfW
DestroyIcon
GetFocus
FindWindowW
SetWindowPos
SetWindowPos
DefWindowProcW
ReleaseDC
GetDesktopWindow
LoadIconW
IsIconic
RegisterClassExW
CheckDlgButton
DestroyIcon
DrawTextW
GetDlgCtrlID
MoveWindow
FindWindowW
MoveWindow
SendMessageA
LoadStringA
MessageBoxA
TranslateMessage
EnableMenuItem
CreateDialogParamW
DestroyMenu
MessageBoxA
IsIconic
GetKeyState
SetRect
wsprintfA
DrawTextW
KillTimer
SetWindowTextW
RegisterClassW
FindWindowW
PeekMessageW
SetWindowLongW
GetDlgCtrlID
LoadStringW
InvalidateRect
EndPaint
EnableMenuItem
LoadCursorW
SetTimer
RegisterClassExW
kernel32
SetLastError
FormatMessageW
GetVersionExA
LocalFree
lstrcpyW
FormatMessageW
FreeLibrary
HeapDestroy
GetStartupInfoA
GetStartupInfoA
GetVersionExA
SetUnhandledExceptionFilter
SetLastError
LeaveCriticalSection
FreeLibrary
GetStartupInfoW
GetTickCount
Sections
Size: 143KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�vmp0 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
�reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE