_u99IW20CNEN@24
Static task
static1
Behavioral task
behavioral1
Sample
e2b8b63c04a11f68e583a7a02e133f5c60d046579feaa3bab6f6aa7fd10b4f22.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e2b8b63c04a11f68e583a7a02e133f5c60d046579feaa3bab6f6aa7fd10b4f22.exe
Resource
win10v2004-20220901-en
General
-
Target
e2b8b63c04a11f68e583a7a02e133f5c60d046579feaa3bab6f6aa7fd10b4f22
-
Size
342KB
-
MD5
3f7c219af43bb7575dcc7302fd8c16d7
-
SHA1
388d6180c2ef64538f59d5b1052c0fc5bf9ae12f
-
SHA256
e2b8b63c04a11f68e583a7a02e133f5c60d046579feaa3bab6f6aa7fd10b4f22
-
SHA512
d66be67f3cb88fd58cf3efdab9f4c560335a5dac54be1ca16a35c64a8ba7e322f17560e2876eda8aebb41132306acbfd4dae0e6d8a54555e54f7a419c7a8bb88
-
SSDEEP
6144:m0Isw1+GDTNhRTR04kcuS72QDK5tMp4192pSnfi6lTzDPq:m9UG/BTRZkct7Kvy4qQ7lTzDPq
Malware Config
Signatures
Files
-
e2b8b63c04a11f68e583a7a02e133f5c60d046579feaa3bab6f6aa7fd10b4f22.exe windows x86
c9461411afcbee91cc4a4bf8fed5481a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetFileTitleA
FindTextA
GetOpenFileNameA
ChooseColorA
kernel32
VirtualAlloc
GetCommandLineW
LocalReAlloc
MulDiv
GetCurrentProcess
LoadLibraryA
ExitProcess
LocalAlloc
MoveFileExA
LocalFree
user32
GetWindowDC
SetFocus
SetClassLongA
CharUpperA
SetCapture
GetMenu
SetForegroundWindow
SetClipboardData
GetWindow
msvcrt
wcsncmp
mbstowcs
calloc
atol
tolower
wcscspn
sqrt
wcstol
Exports
Exports
Sections
CODE Size: 319KB - Virtual size: 318KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 8KB - Virtual size: 756KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cpdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 842B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eadata Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ