?_ClientToScreen@@YGPAXPAKPAEPAI@Z
Static task
static1
Behavioral task
behavioral1
Sample
a4ea64c3e305553d5af31b84d586de91b11785f05084df35bfb10feaff6aaa91.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a4ea64c3e305553d5af31b84d586de91b11785f05084df35bfb10feaff6aaa91.exe
Resource
win10v2004-20220812-en
General
-
Target
a4ea64c3e305553d5af31b84d586de91b11785f05084df35bfb10feaff6aaa91
-
Size
87KB
-
MD5
3a48bfbfc976f6611555ed72ee46ac36
-
SHA1
195c35647a4dd29da6e4ba134530333e4df2653c
-
SHA256
a4ea64c3e305553d5af31b84d586de91b11785f05084df35bfb10feaff6aaa91
-
SHA512
ccf40601e3d6e01e89f7144c03d0315f79e00b4253999dd4a2e80edad698a48bf3fb3cfcee9702d08fae03ed4bdd7805672d479f1e431f4e69768c8643340716
-
SSDEEP
1536:ImNHx85qgjaRVuKCqT71XzMwKjeisssRASWl4CmFLdzSFI7zf6AgruL5:XxcaRAq31XwwlF/RZCoL1SO7zfhNl
Malware Config
Signatures
Files
-
a4ea64c3e305553d5af31b84d586de91b11785f05084df35bfb10feaff6aaa91.exe windows x86
3699a56ddb8f85c81a48665da6ad7966
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrCmpNIW
PathCompactPathW
StrToIntExW
StrRStrIW
StrCpyNW
ord158
PathFindNextComponentW
ChrCmpIW
kernel32
GetLogicalDriveStringsW
MoveFileW
WaitCommEvent
FileTimeToDosDateTime
SetupComm
GetCommModemStatus
LoadLibraryExW
GlobalCompact
SetMessageWaitingIndicator
SetTapePosition
LoadLibraryA
CreateSemaphoreW
lstrcmpW
GetMailslotInfo
GetModuleHandleW
SetWaitableTimer
SetInformationJobObject
user32
GetMouseMovePointsEx
UnregisterClassW
LoadImageW
ScreenToClient
GetSystemMenu
CloseClipboard
GetWindowTextLengthW
WaitForInputIdle
EnumDesktopsW
SetPropW
SetWinEventHook
GetMenuStringA
FrameRect
GetMenuContextHelpId
PostMessageA
SystemParametersInfoA
GetDlgCtrlID
SetWindowTextW
ValidateRect
CheckMenuItem
LoadCursorFromFileW
MapWindowPoints
gdi32
PlayEnhMetaFile
GetEnhMetaFileW
SelectClipPath
GetRandomRgn
GetFontData
PolylineTo
CreateFontIndirectA
GetDeviceCaps
CreateEnhMetaFileA
CreatePolyPolygonRgn
GetTextExtentExPointW
SelectPalette
advapi32
AreAllAccessesGranted
Exports
Exports
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.icode Size: 1024B - Virtual size: 643B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 636B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.m_data Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.c_data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.n_data Size: 1024B - Virtual size: 648B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 858B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ