Static task
static1
Behavioral task
behavioral1
Sample
Document_772-998.scr
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Document_772-998.scr
Resource
win10v2004-20230220-en
General
-
Target
Document_772-998.zip.zip
-
Size
7KB
-
MD5
0188b11c1f824b4fa5d21dbe932a0920
-
SHA1
966a657908486868621e80a3a2ec457fec3cca87
-
SHA256
5d30bdb682b98fdd159451d59a5293ab52d9680d75dbe6e60d6914b0461a88cc
-
SHA512
95bf854cbf6d420e0c3298137b79693fb636e108a2acd6bee4ec4f982406894135129941a5a5a1b8700ef3ef5391103c31ca4d0da69c966667b0f56fd6723f77
-
SSDEEP
192:2U9Kv78/7Eeki6PSDDhyizjKReAgzV1bJp+0p+ft:2U9Kv7EkkHK0bJ00pWt
Malware Config
Signatures
Files
-
Document_772-998.zip.zip.zip
Password: infected
-
Document_772-998.zip.zip
-
Document_772-998.scr.exe windows x86
ba06c2be6a449a968454152ac6f87ed8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ShowScrollBar
DefWindowProcA
SetScrollRange
GetWindowPlacement
wsprintfW
InvalidateRect
GetKeyboardState
SendMessageA
UpdateWindow
ShowWindow
PostQuitMessage
GetMessageA
DispatchMessageA
TranslateMessage
CreateWindowExA
RegisterClassExA
ToAscii
SetScrollPos
kernel32
GetModuleHandleA
lstrcpyA
GetStartupInfoA
HeapCreate
CloseHandle
LoadLibraryExA
comctl32
InitCommonControlsEx
msvcrt
calloc
_onexit
__dllonexit
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 796B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ