Static task
static1
Behavioral task
behavioral1
Sample
47affad3663dacbf9bd99237bb9daad5713bd98b2d2085cdc0253a1fcf01d11f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
47affad3663dacbf9bd99237bb9daad5713bd98b2d2085cdc0253a1fcf01d11f.exe
Resource
win10v2004-20221111-en
General
-
Target
47affad3663dacbf9bd99237bb9daad5713bd98b2d2085cdc0253a1fcf01d11f
-
Size
228KB
-
MD5
82f587da4bae7623910be51f179bc59c
-
SHA1
57a48e4a129356c31da37286fde4ddd14312b06e
-
SHA256
47affad3663dacbf9bd99237bb9daad5713bd98b2d2085cdc0253a1fcf01d11f
-
SHA512
d15ba1b44ccf649c348ceabcdff95edd787c8a3522e3fad9a94802cf24d8a6b2cb9b6ab96d0ec2ceea630551792add0c1a5826029c800c682b3bdff63ab46deb
-
SSDEEP
3072:QXWubAUwKMq4ruSLIvVVHmzqYUapZ3lPKkH19FJodpXZBrPGpEiL2SSumNFiusK+:QX9E3Ru2GSZ1Sw9FJodtZ0pYlm/jUa3J
Malware Config
Signatures
Files
-
47affad3663dacbf9bd99237bb9daad5713bd98b2d2085cdc0253a1fcf01d11f.exe windows x86
2a71d4f31a0049abe53363fda443e30e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdiplus
GdipCloneImage
GdiplusStartup
GdiplusShutdown
GdipBitmapGetPixel
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipGetImageHeight
GdipGetImageWidth
GdipDisposeImage
GdipFree
GdipAlloc
kernel32
HeapFree
FindResourceA
LoadResource
SizeofResource
LockResource
GetProcessHeap
HeapAlloc
CreateFileW
WriteFile
CloseHandle
lstrcatW
OutputDebugStringW
FreeLibrary
GetCurrentProcess
GetProcAddress
LoadLibraryW
LoadLibraryA
user32
UpdateWindow
ShowWindow
CreateWindowExW
RegisterClassExW
LoadCursorW
LoadIconW
DefWindowProcW
InvalidateRect
PostQuitMessage
SendMessageW
GetMessageW
wvsprintfW
EndPaint
FillRect
GetClientRect
BeginPaint
DispatchMessageW
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 216KB - Virtual size: 215KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ