Static task
static1
Behavioral task
behavioral1
Sample
88a17473a0631fec087a4d11d15b6fa4e1c72b1147704a5ca0db57bac18f6899.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
88a17473a0631fec087a4d11d15b6fa4e1c72b1147704a5ca0db57bac18f6899.exe
Resource
win10v2004-20220812-en
General
-
Target
88a17473a0631fec087a4d11d15b6fa4e1c72b1147704a5ca0db57bac18f6899
-
Size
33KB
-
MD5
b8351cb30c756e014ce1b57cafae8a86
-
SHA1
5805a7d1506dc3f75352c4ac0ef90564a9c962d8
-
SHA256
88a17473a0631fec087a4d11d15b6fa4e1c72b1147704a5ca0db57bac18f6899
-
SHA512
450b719b31f73dfdfbf24f19792498675ffaabb1c8447c67639a1042f6d78b4e9120a9affb4747a6ad239999ee4e2444560630842f3c7f3f26f66512f46e4e4d
-
SSDEEP
384:UHe3WG2//Xj93+w+Us1+g2b2vmW/xEawc4P0NDTJUhVV3PmMVV3JlZo+8jXQ+kQ5:Umr2//Xj92UsEHPoyVT3JPruA+hdQ2
Malware Config
Signatures
Files
-
88a17473a0631fec087a4d11d15b6fa4e1c72b1147704a5ca0db57bac18f6899.exe windows x86
5cb773d722840e0e6b67816c712236f1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteA
FindExecutableA
user32
ShowWindow
DefWindowProcA
BeginPaint
GetSysColor
GetClientRect
SetRect
EndPaint
SetWindowWord
GetWindowWord
RegisterClassA
OemToCharA
CharToOemA
OemToCharBuffA
LoadCursorA
DestroyWindow
SetWindowTextA
SendMessageA
EnableWindow
PostMessageA
GetLastActivePopup
SetWindowPos
CharNextA
SetTimer
KillTimer
DialogBoxIndirectParamA
GetWindowRect
GetSystemMetrics
GetKeyState
PeekMessageA
TranslateMessage
DispatchMessageA
GetParent
SetDlgItemTextA
SendDlgItemMessageA
GetDlgItem
InvalidateRect
UpdateWindow
wsprintfA
MessageBoxA
SetCursor
GetDlgItemTextA
EndDialog
kernel32
CreateDirectoryA
_lclose
_lopen
GlobalHandle
RtlUnwind
lstrcmpA
GetCommandLineA
GetModuleHandleA
ExitProcess
SetErrorMode
GetVersion
LoadLibraryA
GetProcAddress
GetModuleFileNameA
FreeLibrary
lstrcmpiA
GetWindowsDirectoryA
GetEnvironmentVariableA
LocalAlloc
LocalFree
GlobalUnlock
lstrcpyA
GlobalFree
GlobalAlloc
GlobalLock
WinExec
_llseek
GetDriveTypeA
_lread
_lwrite
GetVolumeInformationA
FindClose
FindFirstFileA
GetCurrentDirectoryA
SetCurrentDirectoryA
lstrlenA
lstrcatA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
_lcreat
gdi32
SetTextColor
SetTextAlign
GetTextExtentPoint32A
GetBkColor
DeleteObject
SetBkColor
ExtTextOutA
CreateDCA
GetDeviceCaps
CreateFontIndirectA
DeleteDC
SelectObject
advapi32
RegQueryValueA
Sections
.text Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 146B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ