Static task
static1
Behavioral task
behavioral1
Sample
afe46ea93524f8e45c8a2c17c22d212d1ab9354e41ccbb9e5b6650737e7fea00.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
afe46ea93524f8e45c8a2c17c22d212d1ab9354e41ccbb9e5b6650737e7fea00.exe
Resource
win10v2004-20220812-en
General
-
Target
afe46ea93524f8e45c8a2c17c22d212d1ab9354e41ccbb9e5b6650737e7fea00
-
Size
81KB
-
MD5
ffa1234344a9fbe16f5999ff90e572a9
-
SHA1
a878547160b69f6fba74553ed821d977628d39df
-
SHA256
afe46ea93524f8e45c8a2c17c22d212d1ab9354e41ccbb9e5b6650737e7fea00
-
SHA512
fc658fbc0438842c3edd2c9a821b2f0dd92cb63a9e1b84f8002861064293fd45754492eb73f19ecfcfa3cce332f42bb241cdb603ee26068216ee7e3c117acc97
-
SSDEEP
1536:QqzYq7ymSe+9qd7WffoxvwpAYwn7ZInuFQx8Xdgea9dG:Pz97yhrqd7Wo9wKYwitx8eea9E
Malware Config
Signatures
Files
-
afe46ea93524f8e45c8a2c17c22d212d1ab9354e41ccbb9e5b6650737e7fea00.exe windows x86
0241058975c9c00ad49cfce789e66ed8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
GetSubMenu
SetWindowPos
PostQuitMessage
EnableMenuItem
GetMessageA
EnumWindows
GetScrollPos
UnhookWindowsHookEx
GetSysColorBrush
GetSysColor
SetWindowTextA
FrameRect
EqualRect
kernel32
GetACP
SetUnhandledExceptionFilter
FileTimeToSystemTime
GetThreadLocale
RtlUnwind
GetStartupInfoA
VirtualAllocEx
ExitProcess
GetTempPathA
GetOEMCP
GetTimeZoneInformation
GetSystemTime
GetCurrentProcessId
QueryPerformanceCounter
GetTickCount
GetFileAttributesA
InterlockedExchange
gdi32
SetViewportExtEx
CreateCompatibleBitmap
DPtoLP
FillRgn
ExcludeClipRect
SelectClipPath
GetMapMode
CreateICW
CopyEnhMetaFileA
ole32
CoCreateInstance
CoTaskMemRealloc
StgOpenStorage
CoInitializeSecurity
OleRun
CoInitialize
DoDragDrop
StringFromGUID2
CoRevokeClassObject
advapi32
GetSecurityDescriptorDacl
FreeSid
RegCreateKeyA
CryptHashData
QueryServiceStatus
CheckTokenMembership
AdjustTokenPrivileges
RegCreateKeyExW
RegQueryValueExW
GetUserNameA
msvcrt
fflush
_mbscmp
puts
__getmainargs
raise
_flsbuf
iswspace
strncpy
__setusermatherr
strlen
_CIpow
signal
__initenv
_fdopen
_lock
strcspn
fprintf
_strdup
comctl32
ImageList_LoadImageA
ImageList_DragEnter
ImageList_GetIcon
ImageList_LoadImageW
ImageList_Write
ImageList_GetIconSize
ImageList_Destroy
ImageList_ReplaceIcon
CreatePropertySheetPageA
ImageList_SetIconSize
ImageList_GetBkColor
ImageList_DrawEx
InitCommonControls
shell32
ExtractIconExW
ShellExecuteW
DoEnvironmentSubstW
DragQueryFileA
SHBrowseForFolderA
ShellExecuteEx
CommandLineToArgvW
DragQueryFileW
ExtractIconW
DragAcceptFiles
SHGetPathFromIDList
oleaut32
SafeArrayPtrOfIndex
SafeArrayUnaccessData
SafeArrayRedim
SafeArrayCreate
SafeArrayGetUBound
VariantCopy
SysReAllocStringLen
SafeArrayPutElement
Sections
.text Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE