Static task
static1
Behavioral task
behavioral1
Sample
61786e1c3bee0685163a372d07e1d6942081a5c3723f944b5197498ad4619691.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
61786e1c3bee0685163a372d07e1d6942081a5c3723f944b5197498ad4619691.exe
Resource
win10v2004-20220812-en
General
-
Target
61786e1c3bee0685163a372d07e1d6942081a5c3723f944b5197498ad4619691
-
Size
60KB
-
MD5
27c3d98873d7799b12abd721ee4bffdd
-
SHA1
52af290ad6f34842cc61b2d966c22cc791f4044e
-
SHA256
61786e1c3bee0685163a372d07e1d6942081a5c3723f944b5197498ad4619691
-
SHA512
0f6803d13ee5047c9655be024bf32eba2c0c79772c93d96043a77a69c1ead60724c949169817ee11c4561d8075ce1045e2fcb4b91d3563f8d3bf1d519f622a3d
-
SSDEEP
768:oynLo1nf1qmOOIRlbw9fnGe6bGjSnsCPJzUPxpHeVEPSDNP7wI/kgZBhBQhsiSNS:o/1Pmb5hbciidP2pwvK4ZSpfUvL
Malware Config
Signatures
Files
-
61786e1c3bee0685163a372d07e1d6942081a5c3723f944b5197498ad4619691.exe windows x86
4080a09e96380455b289a92e7d51cb8b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
VirtualProtect
CloseHandle
HeapFree
ReadFile
SetFilePointer
HeapAlloc
GetProcessHeap
GetFileSize
CreateFileA
GetModuleFileNameA
CreateMutexA
GetCurrentThreadId
VirtualProtectEx
VirtualAllocEx
GetCurrentProcess
ExitProcess
CreateEventA
GetModuleHandleA
ResetEvent
VirtualFree
VirtualAlloc
GetComputerNameA
InterlockedExchange
RtlUnwind
VirtualQuery
user32
wsprintfA
GetForegroundWindow
DefWindowProcA
PostQuitMessage
PostMessageA
CreateDialogParamA
DispatchMessageA
GetMessageA
SetWindowLongA
CreateWindowExW
RegisterClassExW
FindWindowA
SendMessageA
GetActiveWindow
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ