Static task
static1
Behavioral task
behavioral1
Sample
94769a4b6d76e3b34ce9ca0001bdd1acb943d1900084a77313185e23c78bbe08.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
94769a4b6d76e3b34ce9ca0001bdd1acb943d1900084a77313185e23c78bbe08.exe
Resource
win10v2004-20221111-en
General
-
Target
94769a4b6d76e3b34ce9ca0001bdd1acb943d1900084a77313185e23c78bbe08
-
Size
202KB
-
MD5
1a27c80fe8b88f5bceca4eab7da5df89
-
SHA1
93e4588950fe8ae05991c84cf7309166627d6f5f
-
SHA256
94769a4b6d76e3b34ce9ca0001bdd1acb943d1900084a77313185e23c78bbe08
-
SHA512
97c1a30f4675e5d830e639d6a0497ebff95b4cdea3320f43c643c5a5f62402ff92b2698fb967d18767dc943cf3e17a2766f9894cf2a01ffa9000174d856a7253
-
SSDEEP
6144:riuUDq+7K5zL0tM9QaUBSt6X+XrE/fWhvL8:uu0qqKi2QQtsUr+fW9
Malware Config
Signatures
Files
-
94769a4b6d76e3b34ce9ca0001bdd1acb943d1900084a77313185e23c78bbe08.exe windows x86
4e68ac58c25b2cda3331ff8d00fb864e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpyA
GetProcAddress
IsValidLocale
CreateNamedPipeW
lstrlenW
GetModuleHandleA
HeapCreate
GetAtomNameW
SetUnhandledExceptionFilter
IsBadCodePtr
user32
GetDCEx
DrawTextW
GetMenu
SetActiveWindow
ShowCaret
RegisterClassExA
EmptyClipboard
FillRect
WinHelpW
MonitorFromWindow
DefWindowProcA
FindWindowW
GetSystemMetrics
LoadImageA
GetClassNameW
SetTimer
CharPrevW
GetActiveWindow
CreateDialogIndirectParamA
DefDlgProcA
CopyIcon
SetWindowRgn
RegisterClassA
GetCapture
MonitorFromPoint
EnumChildWindows
IsDlgButtonChecked
LoadMenuIndirectA
DialogBoxIndirectParamA
UpdateWindow
EnumDesktopWindows
GetSubMenu
AnimateWindow
CreateDialogParamW
GetClientRect
CopyRect
InsertMenuA
GetWindowTextW
CheckDlgButton
CreatePopupMenu
CascadeWindows
gdi32
PolyBezierTo
GetTextExtentPointI
FontIsLinked
SetBitmapDimensionEx
SetICMProfileW
CreateDIBPatternBrush
GetGlyphOutlineA
advapi32
RegOpenKeyA
RegCreateKeyExA
RegSaveKeyW
RegSaveKeyA
shell32
StrRChrW
SHGetSpecialFolderLocation
StrRChrIW
StrCmpNIA
SHBrowseForFolder
SHGetDiskFreeSpaceExA
shlwapi
PathIsSystemFolderA
PathRemoveFileSpecA
SHOpenRegStreamW
PathAddExtensionA
PathSkipRootW
PathRemoveFileSpecW
AssocQueryKeyA
PathQuoteSpacesW
StrChrNIW
PathFindExtensionA
UrlCombineA
PathUnquoteSpacesA
UrlHashA
StrStrNW
PathIsUNCA
SHRegGetBoolUSValueA
ole32
CoCreateInstanceEx
CoGetClassObject
CoGetInstanceFromFile
CoGetClassVersion
CoGetCurrentProcess
CoGetMalloc
CoFileTimeNow
wininet
SetUrlCacheEntryInfoA
wsock32
GetNameByTypeA
WSAStartup
WSAAsyncGetServByName
inet_network
getpeername
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.VMC Size: 512B - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.KAUNd Size: 3KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.WMtCq Size: 512B - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.BV Size: 2KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vxsZR Size: 1KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MkZv Size: 1KB - Virtual size: 208KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 163KB - Virtual size: 162KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ