Static task
static1
Behavioral task
behavioral1
Sample
d67b91094da0bd6baee43240af4905b124342e78a83acf1462745749966ea102.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d67b91094da0bd6baee43240af4905b124342e78a83acf1462745749966ea102.exe
Resource
win10v2004-20220812-en
General
-
Target
d67b91094da0bd6baee43240af4905b124342e78a83acf1462745749966ea102
-
Size
76KB
-
MD5
01c7f9ca9987e201d0f9ed3ba292183c
-
SHA1
9a54e189977fb813b1bdf3913614072afdb30cdd
-
SHA256
d67b91094da0bd6baee43240af4905b124342e78a83acf1462745749966ea102
-
SHA512
5db5899bb9104b2b2eefe88096aca46c115c6ed5418edd26e2dc48f6a1c59d8b391f22ee8cf3ad8c80594bb5d8e9de3c34762016990aa026dd5fd2cc9b2e92b9
-
SSDEEP
1536:OGq+O0a7ertP3Pn0I/GbT8LHNnrrqcgmHyP:hq+OperB/072HlrrgmS
Malware Config
Signatures
Files
-
d67b91094da0bd6baee43240af4905b124342e78a83acf1462745749966ea102.exe windows x86
6694b436c6cb48f74fdf121b77d06c23
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
HeapAlloc
GetProcAddress
GetModuleHandleA
LoadLibraryA
InterlockedDecrement
LocalFree
InterlockedIncrement
GetVersionExW
UnhandledExceptionFilter
user32
EnumChildWindows
SetScrollPos
EndMenu
EndDialog
EndDeferWindowPos
EnableScrollBar
EnableMenuItem
EmptyClipboard
CloseClipboard
ClipCursor
ClientToScreen
ChildWindowFromPointEx
ChildWindowFromPoint
GetWindowTextLengthW
EnableWindow
DialogBoxParamW
CreateDialogParamW
GetWindowTextW
SetWindowPos
SetCursor
SetForegroundWindow
FindWindowW
GetSystemMetrics
MoveWindow
SendMessageW
CharNextW
CheckMenuItem
CharPrevExA
CharPrevW
CharToOemA
CharToOemBuffA
CharToOemBuffW
CheckDlgButton
CopyIcon
CopyImage
EndPaint
gdi32
SetAbortProc
GetTextMetricsW
SetBkMode
StartDocW
SetWindowExtEx
SetViewportExtEx
SetMapMode
CreateFontIndirectW
StartPage
LPtoDP
AbortDoc
EndDoc
DeleteDC
TextOutW
GetTextExtentPoint32W
CreateDCW
SelectObject
GetTextFaceW
EndPage
advapi32
RegOpenKeyW
RegOpenKeyA
msi
ord55
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xata1 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xata2 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xata3 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xata4 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xata5 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xata6 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 736B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ