Static task
static1
Behavioral task
behavioral1
Sample
0a60dbdcf8bf1881c53d8ad35421ad54e5878b63c03eb479a1d5e9bb0ee05c60.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0a60dbdcf8bf1881c53d8ad35421ad54e5878b63c03eb479a1d5e9bb0ee05c60.exe
Resource
win10v2004-20220414-en
General
-
Target
0a60dbdcf8bf1881c53d8ad35421ad54e5878b63c03eb479a1d5e9bb0ee05c60
-
Size
190KB
-
MD5
93b93121fca5483efaaa9bc4641460a4
-
SHA1
8bf52615946aa3651c3c0b55d529ce63a9fafdac
-
SHA256
0a60dbdcf8bf1881c53d8ad35421ad54e5878b63c03eb479a1d5e9bb0ee05c60
-
SHA512
e65d70a33f2264ec33fac68f418fde8dc90b0337999d35abb3f5b976029ded777ae869aca4e1494454016969db556f58edbe23852b0d7c2986d5b88065c1c0d3
-
SSDEEP
3072:GiD+vsoae0qzZFyl6lIT2J1lyIA+djz2ipzNnwyjTY6QcgsywcJ8WsrFmZln:GiCvMEVFRw2TlyIdjz2+5Gr9wm8mH
Malware Config
Signatures
Files
-
0a60dbdcf8bf1881c53d8ad35421ad54e5878b63c03eb479a1d5e9bb0ee05c60.exe windows x86
1fe8c72134def587f2ebd975d99a5100
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegOpenKeyA
RegCloseKey
RegQueryValueA
RegQueryValueExA
RegSetValueA
RegEnumKeyA
RegOpenKeyExA
kernel32
GetSystemTime
GetLastError
LocalLock
SystemTimeToFileTime
GlobalDeleteAtom
lstrlenA
GetFileAttributesA
GlobalFree
WaitForSingleObject
FreeLibrary
QueryPerformanceCounter
GetTickCount
GetThreadLocale
GlobalUnlock
LoadLibraryA
VirtualProtect
GlobalAlloc
GlobalReAlloc
OpenFile
GetStartupInfoA
_lwrite
LocalAlloc
AddAtomA
lstrcatA
DeleteFileA
CreateThread
UnhandledExceptionFilter
MultiByteToWideChar
_llseek
GlobalLock
_lread
_lcreat
_lclose
RaiseException
WideCharToMultiByte
lstrcmpiA
GetModuleHandleA
lstrcmpA
FindFirstFileA
GlobalAddAtomA
SetUnhandledExceptionFilter
lstrcpyA
_lopen
DeleteAtom
CloseHandle
GetSystemTimeAsFileTime
GetACP
GetCurrentThreadId
SetFileAttributesA
InterlockedExchange
LocalFree
TerminateProcess
GetCurrentProcess
GetAtomNameA
CreateFileW
GlobalHandle
FindClose
Sleep
LocalUnlock
GetProcAddress
GetCurrentProcessId
MulDiv
shell32
ShellAboutA
ShellExecuteExA
DragFinish
DragAcceptFiles
DragQueryFileA
ExtractAssociatedIconA
user32
RegisterClipboardFormatA
EnableScrollBar
DestroyMenu
PostQuitMessage
SetWindowPos
IsWindow
DispatchMessageA
EndPaint
CharUpperBuffA
RealGetWindowClassA
BringWindowToTop
GetDC
InternalGetWindowText
ChildWindowFromPoint
ReleaseDC
GetMenu
SendMessageA
GetClientRect
SetScrollPos
LoadAcceleratorsA
IsClipboardFormatAvailable
GetTopWindow
ScrollWindow
DestroyWindow
GetMessageA
UpdateWindow
CheckRadioButton
ShowWindow
EnableWindow
GetDlgItemTextA
PeekMessageA
TranslateMessage
IsWindowEnabled
LoadStringA
SetClipboardData
CharLowerA
LoadStringW
IsIconic
RegisterClassA
GetSubMenu
CreateWindowExA
FillRect
EnumThreadWindows
CharNextA
GetSysColorBrush
SetFocus
ReleaseCapture
SetCapture
BeginPaint
OffsetRect
GetScrollPos
DefWindowProcA
GetClipboardData
SendDlgItemMessageA
GetSystemMetrics
GetLayeredWindowAttributes
EnableMenuItem
PostMessageA
DrawIcon
CheckDlgButton
CreatePopupMenu
DrawFocusRect
GetDlgItem
ScreenToClient
InsertMenuA
LoadCursorA
LoadIconA
IsDlgButtonChecked
OpenClipboard
EmptyClipboard
DrawTextA
GetScrollRange
EndDialog
SetWindowTextA
SetDlgItemTextA
SetRectEmpty
MessageBoxA
GetWindowDC
DialogBoxParamA
GetSysColor
GetKeyState
SystemParametersInfoA
DestroyIcon
IsWindowVisible
SetRect
DeleteMenu
InvalidateRect
TranslateAcceleratorA
IsRectEmpty
CloseClipboard
SetCursor
comdlg32
GetOpenFileNameA
GetSaveFileNameA
msvcrt
strchr
_cexit
_c_exit
_vsnprintf
_except_handler3
_adjust_fdiv
memmove
_acmdln
__setusermatherr
__p__commode
__p__fmode
_controlfp
exit
_XcptFilter
__getmainargs
_exit
_initterm
__set_app_type
Sections
.text Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 142KB - Virtual size: 141KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ