Static task
static1
Behavioral task
behavioral1
Sample
48fd14c003fa1b4b2f4e561d3d49092ee1dabc10d631ba81f681d923089613b5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
48fd14c003fa1b4b2f4e561d3d49092ee1dabc10d631ba81f681d923089613b5.exe
Resource
win10-20220901-en
General
-
Target
48fd14c003fa1b4b2f4e561d3d49092ee1dabc10d631ba81f681d923089613b5
-
Size
359KB
-
MD5
e9f23213aed3e2591fc05da52551d5fc
-
SHA1
7586c3a7b5adbcdd6fe127338411d2f8d4501b00
-
SHA256
48fd14c003fa1b4b2f4e561d3d49092ee1dabc10d631ba81f681d923089613b5
-
SHA512
48091af8e2c8ada369145d4a01143c02c955eab53901da83b20202a87a2151d2cee3b45f2ae6e07aebbc1f461eec65fccdf8fc0cc67823ccddc1ee54509e1458
-
SSDEEP
6144:/Vmb3TvJWfYUBmDdFGzjNKdCcPVbPIwxrrD35djDbFDVDvTbDz7kvDLYDMDz8LDF:4Wfzr3Yd92rK
Malware Config
Signatures
Files
-
48fd14c003fa1b4b2f4e561d3d49092ee1dabc10d631ba81f681d923089613b5.exe windows x86
f771f4d89ab421e1982727fded800fb5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CheckMenuItem
GetDlgItem
SendDlgItemMessageA
AppendMenuA
CreatePopupMenu
DestroyMenu
ClientToScreen
TrackPopupMenu
GetCursorPos
SendMessageA
GetDlgItemTextA
wsprintfA
MessageBoxA
LoadCursorA
GetActiveWindow
CheckDlgButton
SetWindowTextA
IsDlgButtonChecked
SetWindowLongA
CallWindowProcA
GetClassInfoA
CloseClipboard
GetClipboardData
EnumClipboardFormats
SetDlgItemTextA
EndDialog
RegisterClassA
DefDlgProcA
SetActiveWindow
SetMenuItemInfoA
GetMenu
kernel32
LeaveCriticalSection
WriteConsoleW
CloseHandle
CreateFileW
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
HeapSize
GetProcessHeap
LCMapStringW
CompareStringW
GetStringTypeW
GetFileType
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCPInfo
AddAtomW
GetCommandLineW
QueryPerformanceFrequency
GetModuleHandleA
GetProcAddress
FreeConsole
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
GetOEMCP
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
DecodePointer
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
EncodePointer
RaiseException
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
GetCommandLineA
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
Sections
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 281KB - Virtual size: 281KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bX` Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ