Static task
static1
Behavioral task
behavioral1
Sample
a80e6043dcc885839e9e9b9bc69d6490429d691e4318bc9da6c8b741307a6d26.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a80e6043dcc885839e9e9b9bc69d6490429d691e4318bc9da6c8b741307a6d26.exe
Resource
win10-20220812-en
General
-
Target
a80e6043dcc885839e9e9b9bc69d6490429d691e4318bc9da6c8b741307a6d26
-
Size
240KB
-
MD5
fc7aff67e124fd5947ab935fb2036c4f
-
SHA1
c69b696317c68d5ebb3eac2a7a5731e8aff248f2
-
SHA256
a80e6043dcc885839e9e9b9bc69d6490429d691e4318bc9da6c8b741307a6d26
-
SHA512
80a05976ec084d605a94025fe3235a4c60aa77436f0e7a21474300bbb5057425ed58a5d610ba040ce815de4b216d7c019792ca822d1bbf8de0d0a39ddb7093c1
-
SSDEEP
6144:C5k8CDWK+yGvon2HxonrV5l/Ja2IBKoKoEtM+0OE4oNYSdmiEn3rLV:CKao2m7pMJKLe4o1dmim
Malware Config
Signatures
Files
-
a80e6043dcc885839e9e9b9bc69d6490429d691e4318bc9da6c8b741307a6d26.exe windows x86
051cc5aae81598b1e9797d7658c81431
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
InsertMenuItemA
GetDlgItem
SendDlgItemMessageA
AppendMenuA
CreatePopupMenu
DestroyMenu
ClientToScreen
TrackPopupMenu
GetCursorPos
SendMessageA
GetDlgItemTextA
wsprintfA
MessageBoxA
LoadCursorA
GetActiveWindow
CheckDlgButton
SetWindowTextA
IsDlgButtonChecked
SetWindowLongA
CallWindowProcA
GetClassInfoA
CloseClipboard
GetClipboardData
EnumClipboardFormats
SetDlgItemTextA
EndDialog
RegisterClassA
DefDlgProcA
SetActiveWindow
SetMenuItemInfoA
CheckMenuItem
GetMenu
SetWindowPlacement
kernel32
DeleteCriticalSection
WriteConsoleW
CloseHandle
CreateFileW
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
HeapSize
GetProcessHeap
LCMapStringW
CompareStringW
GetStringTypeW
GetFileType
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCPInfo
GetOEMCP
GetACP
IsProcessorFeaturePresent
AddAtomW
GetModuleHandleA
GetProcAddress
FreeConsole
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
GetCurrentProcess
TerminateProcess
IsValidCodePage
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DecodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
EncodePointer
RaiseException
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
Sections
.text Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 160KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
..`f Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 536B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ