Static task
static1
Behavioral task
behavioral1
Sample
a872bc3e1808e1efd7a3898f391e04b00a622591fef67e98175c3e272644b7c6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a872bc3e1808e1efd7a3898f391e04b00a622591fef67e98175c3e272644b7c6.exe
Resource
win10v2004-20220812-en
General
-
Target
a872bc3e1808e1efd7a3898f391e04b00a622591fef67e98175c3e272644b7c6
-
Size
168KB
-
MD5
1b09ff13698091487cf7e51509117ac2
-
SHA1
afce3921e14c402bae45a88670c3106df6ae962e
-
SHA256
a872bc3e1808e1efd7a3898f391e04b00a622591fef67e98175c3e272644b7c6
-
SHA512
9be2ff48a4fc8bfd4bcbc33d7ec77e3269ae7d4fd47905c7ae4aee5ac8ed2e8f12dc3e84ea08c2f4732fe8045675792b567f05f7fdffe8ebc2120e61d3556b5b
-
SSDEEP
3072:+qoIXbGFEhaZZbgYS/2GEoTYLywPPba4a28vWtoIXbtFhuTVbgb:boIXbMVfSOGAy6ba4HgaoIXbu
Malware Config
Signatures
Files
-
a872bc3e1808e1efd7a3898f391e04b00a622591fef67e98175c3e272644b7c6.exe windows x86
d112082f79118e5210b955e4dca80d6b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTimeFormatA
ExitProcess
LoadLibraryA
GetProcAddress
CreateThread
Sleep
GetModuleHandleA
GetStartupInfoA
user32
DestroyWindow
GetSystemMetrics
RegisterClassA
LoadCursorA
PostQuitMessage
CreateWindowExA
LoadIconA
SetDlgItemTextA
GetWindowRect
MessageBoxA
LoadImageA
ReleaseDC
GetDCEx
WaitMessage
DispatchMessageA
TranslateMessage
PeekMessageA
ShowWindow
DefWindowProcA
UpdateWindow
SetFocus
gdi32
CreateCompatibleBitmap
CreateRectRgnIndirect
DeleteObject
GetStockObject
GetObjectA
msvcp60
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
??9std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
msvcrt
sprintf
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
atoi
memmove
malloc
getenv
??2@YAPAXI@Z
memset
memcpy
_except_handler3
rand
strlen
_controlfp
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 147KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ