Static task
static1
Behavioral task
behavioral1
Sample
b71b2deb990ef3868485d0017607e45fb4c37b2ad11a27a5c16a1bcf7219c3fb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b71b2deb990ef3868485d0017607e45fb4c37b2ad11a27a5c16a1bcf7219c3fb.exe
Resource
win10v2004-20221111-en
General
-
Target
b71b2deb990ef3868485d0017607e45fb4c37b2ad11a27a5c16a1bcf7219c3fb
-
Size
275KB
-
MD5
dc1a2b02c47d9f9fb76d9fba428a3e99
-
SHA1
6a2dba2e8010237c0ae9b829075beb7ba8daa33f
-
SHA256
b71b2deb990ef3868485d0017607e45fb4c37b2ad11a27a5c16a1bcf7219c3fb
-
SHA512
7ca812b4b890cb35811c015dc3920f4b852b4d3a8121346b2ee08d32b89bae54b98eb0feefa56ed7d065701fdcc8064bb29a960b0e820a3bc7b0e93733352a5e
-
SSDEEP
6144:z60Ae2X4HzKZh8kRbjtKjf1MlkZ3Plk0J3Z:G0Ae2oHzKZCK3AjftNl5JJ
Malware Config
Signatures
Files
-
b71b2deb990ef3868485d0017607e45fb4c37b2ad11a27a5c16a1bcf7219c3fb.exe windows x86
924c18ba5df5f763e9e4d9dacad1bb4a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetWindowLongA
GetDesktopWindow
SetWindowTextA
IsCharAlphaA
EnumChildWindows
GetActiveWindow
MoveWindow
DialogBoxParamA
ole32
CoRevokeClassObject
comctl32
InitCommonControlsEx
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
kernel32
LocalAlloc
SetFileAttributesA
HeapFree
HeapCreate
GetDateFormatA
GetStartupInfoA
GetTimeZoneInformation
HeapDestroy
ExitProcess
LocalFree
GetProcAddress
FreeLibrary
LoadLibraryA
DeleteCriticalSection
InitializeCriticalSection
GetTickCount
ResumeThread
IsBadStringPtrA
Sections
.text Size: 262KB - Virtual size: 261KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ