Static task
static1
Behavioral task
behavioral1
Sample
f69d43903cf7255330988161e314df2401db420d154b95c0a2d3963c1b178977.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f69d43903cf7255330988161e314df2401db420d154b95c0a2d3963c1b178977.exe
Resource
win10v2004-20220901-en
General
-
Target
f69d43903cf7255330988161e314df2401db420d154b95c0a2d3963c1b178977
-
Size
128KB
-
MD5
8545fd33a178998450cdfff6d2e7e75b
-
SHA1
1f9866e4f8a3d5aab94eef7e44bf66fe999264be
-
SHA256
f69d43903cf7255330988161e314df2401db420d154b95c0a2d3963c1b178977
-
SHA512
013b8e3c24821b3135be4230a2360258dfbed8364d58781d87f2e79340cc983bb7f844644c9c8bbe52e90c4b76f7f6720dd1720348f05abd23c311d35dc77a5f
-
SSDEEP
3072:FU/3X1ra7f/DnF/jRMVSpAdZMW1rIqlXSxnXnYSm8:m/Y7TnFXpEZMW1rIqIx3
Malware Config
Signatures
Files
-
f69d43903cf7255330988161e314df2401db420d154b95c0a2d3963c1b178977.exe windows x86
14906bc9508ea8e11f913b51813f955f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
GetStringTypeW
LocalAlloc
LoadLibraryA
lstrlenA
GetTickCount
VirtualAlloc
VirtualFree
VirtualAllocEx
GetModuleHandleA
FormatMessageA
GetProcessHeap
InitializeCriticalSection
GetStringTypeA
ExitThread
ExitProcess
GetOEMCP
GetProcAddress
ReadFile
user32
GetSubMenu
IsWindowVisible
GetWindowDC
IsWindow
InflateRect
FrameRect
GetCursor
DeleteMenu
DestroyMenu
GetKeyNameTextA
GetDlgItem
GetMenuItemInfoA
SetCapture
EnumWindows
GetKeyState
RemoveMenu
CharNextA
IsWindowEnabled
SetScrollRange
gdi32
CreatePenIndirect
GetPaletteEntries
GetCurrentPositionEx
CreateFontIndirectA
SetBkMode
SaveDC
oleaut32
SafeArrayGetElement
SysFreeString
SafeArrayPtrOfIndex
GetErrorInfo
OleLoadPicture
SysReAllocStringLen
SysStringLen
RegisterTypeLib
comctl32
ImageList_Remove
ImageList_DragShowNolock
ImageList_Draw
ImageList_Create
ImageList_Destroy
ImageList_DrawEx
ImageList_Add
comdlg32
GetSaveFileNameA
ChooseColorA
FindTextA
GetOpenFileNameA
version
GetFileVersionInfoA
VerInstallFileA
shell32
SHGetSpecialFolderLocation
DragQueryFileA
SHGetDiskFreeSpaceA
Sections
.text Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ