IySJEyEVFW_R4@20
Static task
static1
Behavioral task
behavioral1
Sample
a39d6506604521b923377291d4bebb0598936e6b27573f57fa9ee8ecd868956c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a39d6506604521b923377291d4bebb0598936e6b27573f57fa9ee8ecd868956c.exe
Resource
win10v2004-20220812-en
General
-
Target
a39d6506604521b923377291d4bebb0598936e6b27573f57fa9ee8ecd868956c
-
Size
67KB
-
MD5
b664b54c44380f07f776fe2a1ace7360
-
SHA1
16cb995215f9a3959fcfcbc4c769dc03eb29262a
-
SHA256
a39d6506604521b923377291d4bebb0598936e6b27573f57fa9ee8ecd868956c
-
SHA512
d08ad82e758ac2790b7a1f304386d253fa607cc6d7f2f0cb11dff4cf3f9a2558b79eddec212175b9b1ae5c89a7a343226d5c29016eca44546b0e9b805088c9bd
-
SSDEEP
1536:bhSoNcLhPf4WaWD1u3MlmlnjXemjRH8fY89eB:KRf4je1u8onSmlcfN9e
Malware Config
Signatures
Files
-
a39d6506604521b923377291d4bebb0598936e6b27573f57fa9ee8ecd868956c.exe windows x86
da1d15f15987e7f4df49dcb497178faf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetBkMode
GetTextAlign
CreateCompatibleDC
CreateBrushIndirect
GetTextColor
CreatePalette
CreateDIBitmap
GetDIBColorTable
GetClipBox
GetObjectA
user32
MsgWaitForMultipleObjects
DestroyMenu
DrawIcon
GetIconInfo
SetPropA
IsDialogMessageA
GetMenuItemInfoA
GetClassNameA
DrawAnimatedRects
GetWindowLongA
DeleteMenu
SetRect
EnableMenuItem
LoadCursorA
MessageBoxA
InsertMenuA
GetWindowTextLengthA
GetMenuItemID
CharLowerA
InsertMenuItemA
GetCursor
GetParent
IsCharUpperA
GetDesktopWindow
CreatePopupMenu
SetFocus
GetCapture
PostQuitMessage
CharUpperBuffA
GetClipboardData
SetWindowLongA
GetDC
SetScrollPos
GetWindowRect
GetSystemMenu
DefFrameProcA
RegisterClipboardFormatA
PostMessageA
GetPropA
CallNextHookEx
LoadStringA
KillTimer
GetMenu
WaitMessage
EndPaint
SetParent
LoadBitmapA
CharNextA
SetScrollInfo
EnumChildWindows
EqualRect
RedrawWindow
WindowFromPoint
GetKeyboardState
GetMessagePos
SetWindowLongW
DestroyCursor
GetMenuStringA
DrawTextA
SetWindowsHookExA
GetWindow
GetWindowLongW
EnumThreadWindows
IsCharLowerA
GetMenuState
kernel32
GetThreadLocale
SetErrorMode
Sleep
lstrlenA
ExitThread
IsBadReadPtr
WriteFile
GlobalAddAtomA
ReadFile
GetProcessHeap
EnumCalendarInfoA
GetACP
GetLastError
FreeResource
GetModuleHandleW
GetFullPathNameA
VirtualQuery
GetDateFormatA
FindClose
GetCurrentThreadId
LoadLibraryA
CloseHandle
MoveFileExA
SetEndOfFile
GetOEMCP
GetLocalTime
SetFilePointer
GetFileAttributesA
LocalReAlloc
CompareStringA
HeapDestroy
DeleteFileA
FormatMessageA
GetFileType
ResetEvent
VirtualAllocEx
GetVersionExA
lstrlenW
GetCurrentProcess
lstrcpynA
GetTickCount
FindFirstFileA
lstrcpyA
FindResourceA
DeleteCriticalSection
VirtualAlloc
RaiseException
GetStdHandle
ExitProcess
GetSystemDefaultLangID
CreateEventA
LocalAlloc
LockResource
SetEvent
GetCommandLineA
GetProcAddress
MulDiv
VirtualFree
GetStartupInfoA
CreateThread
MoveFileA
EnterCriticalSection
GetCommandLineW
GlobalFindAtomA
SetHandleCount
shlwapi
SHSetValueA
PathFileExistsA
SHDeleteValueA
SHDeleteKeyA
PathIsDirectoryA
PathIsContentTypeA
Exports
Exports
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ