Static task
static1
Behavioral task
behavioral1
Sample
99b9935483f7d7ff986b57c59a42834611ff73102712af3e529221fb7741cc60.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
99b9935483f7d7ff986b57c59a42834611ff73102712af3e529221fb7741cc60.exe
Resource
win10v2004-20220812-en
General
-
Target
99b9935483f7d7ff986b57c59a42834611ff73102712af3e529221fb7741cc60
-
Size
392KB
-
MD5
fef94190cfac9393c542196805e82ca1
-
SHA1
6a35c99a9815a4785645542f691d340681d5e735
-
SHA256
99b9935483f7d7ff986b57c59a42834611ff73102712af3e529221fb7741cc60
-
SHA512
2000cfdaa62d9485b97aa50b078d395b847af5f7b27ca1980ddc4b48c6fddfbd143d93107f945bc2465ec2d0d76a75f07ddca6c757c8413dcfb973a7ffb75d6e
-
SSDEEP
6144:xh1wG0fljKQIZhzc7HVHtf5vuyh+ajZCsuAMXMzFHCD/yr07oAH4fa6zvNP83:3/ApUvsfRh+ajZCBAMXoUK0VHGa6zV03
Malware Config
Signatures
Files
-
99b9935483f7d7ff986b57c59a42834611ff73102712af3e529221fb7741cc60.exe windows x86
c5ea82435a4f045ade5503075798e6af
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GlobalFree
HeapDestroy
CreateMutexA
GetEnvironmentVariableA
CreateFileA
ExitThread
SetConsoleCursorInfo
LocalUnlock
TlsGetValue
GetACP
SetLastError
UnmapViewOfFile
LoadLibraryExW
ReleaseMutex
HeapCreate
FindClose
FindResourceA
GetProcessHeap
GetLastError
user32
DefWindowProcW
DispatchMessageA
CheckRadioButton
GetFocus
FillRect
DrawMenuBar
GetIconInfo
GetDC
DrawEdge
CallWindowProcA
CopyRect
IsWindow
GetDlgItem
uxtheme
DrawThemeIcon
GetThemeRect
DrawThemeEdge
GetThemeSysInt
DrawThemeText
clbcatq
SetupOpen
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ