Static task
static1
Behavioral task
behavioral1
Sample
229b058509242485e6b4aecdacb843f4b10563e7b13253dcfdc79ec8bf09b607.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
229b058509242485e6b4aecdacb843f4b10563e7b13253dcfdc79ec8bf09b607.exe
Resource
win10v2004-20221111-en
General
-
Target
229b058509242485e6b4aecdacb843f4b10563e7b13253dcfdc79ec8bf09b607
-
Size
243KB
-
MD5
943f70e844bb11e6c2a347765374726a
-
SHA1
ab2ee07a561bad5853b4281ecd479623ca48802b
-
SHA256
229b058509242485e6b4aecdacb843f4b10563e7b13253dcfdc79ec8bf09b607
-
SHA512
d4ed1e71ff7e603fbdb5af85bac23d9db84141a3f20572bdc7a52d1f14b9711df05c3fe1129c25f9cbb617ed13d2a822c95c3a92e94ff28c0bdaa9a9c1f0d932
-
SSDEEP
6144:LMUdRXB8mtBeUY6VCbF7VM0CJvA3yxmp1yWHin66tzt:Lhdf8mtRCb3M0CpHG1Lb6t5
Malware Config
Signatures
Files
-
229b058509242485e6b4aecdacb843f4b10563e7b13253dcfdc79ec8bf09b607.exe windows x86
5d81a5533d99e25af8177b6d2646ad74
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
_isnan
sprintf
strncpy
strcmp
memmove
memcpy
_CIpow
strlen
kernel32
GetModuleHandleA
HeapCreate
Sleep
HeapDestroy
ExitProcess
GetCurrentThreadId
GetCurrentProcessId
CloseHandle
InitializeCriticalSection
GetModuleFileNameA
HeapReAlloc
HeapAlloc
HeapFree
user32
CallWindowProcA
MessageBoxA
GetWindowThreadProcessId
IsWindowVisible
IsWindowEnabled
GetForegroundWindow
GetWindowLongA
SetWindowPos
EnableWindow
EnumWindows
comctl32
InitCommonControlsEx
ole32
CoInitialize
Sections
.code Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 57B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc.. Size: 219KB - Virtual size: 218KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ