Static task
static1
Behavioral task
behavioral1
Sample
b4ea1fc1f34f8725450a366b6ada501b4d8489b50c287ac8149095c1ec035447.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b4ea1fc1f34f8725450a366b6ada501b4d8489b50c287ac8149095c1ec035447.exe
Resource
win10v2004-20220812-en
General
-
Target
b4ea1fc1f34f8725450a366b6ada501b4d8489b50c287ac8149095c1ec035447
-
Size
76KB
-
MD5
62cfc0c6864af1c811f2b30c420282fa
-
SHA1
714da9b5c857380f24c1f01615d929639fadc626
-
SHA256
b4ea1fc1f34f8725450a366b6ada501b4d8489b50c287ac8149095c1ec035447
-
SHA512
63359dc2df70e1d3f65261828af7ec696c0324ed6f52137438db0865dbe3efa9c83712f51f4342adac413e95633cce451252aab61a4cd47bd365610b32c15705
-
SSDEEP
1536:4hJev3S7erMoii/GbT8LHNnrrqcg+HyP:4JevUerw2Hlrrg+S
Malware Config
Signatures
Files
-
b4ea1fc1f34f8725450a366b6ada501b4d8489b50c287ac8149095c1ec035447.exe windows x86
6694b436c6cb48f74fdf121b77d06c23
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
HeapAlloc
GetProcAddress
GetModuleHandleA
LoadLibraryA
InterlockedDecrement
LocalFree
InterlockedIncrement
GetVersionExW
UnhandledExceptionFilter
user32
EnumChildWindows
SetScrollPos
EndMenu
EndDialog
EndDeferWindowPos
EnableScrollBar
EnableMenuItem
EmptyClipboard
CloseClipboard
ClipCursor
ClientToScreen
ChildWindowFromPointEx
ChildWindowFromPoint
GetWindowTextLengthW
EnableWindow
DialogBoxParamW
CreateDialogParamW
GetWindowTextW
SetWindowPos
SetCursor
SetForegroundWindow
FindWindowW
GetSystemMetrics
MoveWindow
SendMessageW
CharNextW
CheckMenuItem
CharPrevExA
CharPrevW
CharToOemA
CharToOemBuffA
CharToOemBuffW
CheckDlgButton
CopyIcon
CopyImage
EndPaint
gdi32
SetAbortProc
GetTextMetricsW
SetBkMode
StartDocW
SetWindowExtEx
SetViewportExtEx
SetMapMode
CreateFontIndirectW
StartPage
LPtoDP
AbortDoc
EndDoc
DeleteDC
TextOutW
GetTextExtentPoint32W
CreateDCW
SelectObject
GetTextFaceW
EndPage
advapi32
RegOpenKeyW
RegOpenKeyA
msi
ord55
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xata1 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xata2 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xata3 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xata4 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xata5 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xata6 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 736B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ