Static task
static1
Behavioral task
behavioral1
Sample
41fb0d5abfce450b71c05c46fe04ea03c31264c7474832d9979dbb1d03865629.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
41fb0d5abfce450b71c05c46fe04ea03c31264c7474832d9979dbb1d03865629.exe
Resource
win10v2004-20220414-en
General
-
Target
41fb0d5abfce450b71c05c46fe04ea03c31264c7474832d9979dbb1d03865629
-
Size
686KB
-
MD5
efa2a4323f392f4200b1955e61c8faa9
-
SHA1
1c2ff80ad2942b508c9e410a1403ee8ec05bf6b7
-
SHA256
41fb0d5abfce450b71c05c46fe04ea03c31264c7474832d9979dbb1d03865629
-
SHA512
9c4253d4062dc43c4dfc18c0a49bafb9fc74bab4ced012404f7d9996204784bf684e2810abfa81fcc48ccea780f08600d67ab3b0a41ce867d09399e5c162e788
-
SSDEEP
12288:a/md4jj+Yyl6kNHZVLxnEgODKVwsocBTs583TzniJsCiq0:aWYjkxZVLxnEgODKQWTUZC
Malware Config
Signatures
Files
-
41fb0d5abfce450b71c05c46fe04ea03c31264c7474832d9979dbb1d03865629.exe windows x86
77aa9518b3eac75a5e27fe1d6e0fb653
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleCP
SetFilePointer
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapSize
GetCurrentProcessId
GetTickCount
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetModuleFileNameA
VirtualQuery
IsProcessorFeaturePresent
GetModuleFileNameW
GetStdHandle
WriteFile
GetCurrentProcess
TerminateProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
GetConsoleMode
GetLocaleInfoW
LoadLibraryW
HeapReAlloc
LCMapStringW
MultiByteToWideChar
GetStringTypeW
SetStdHandle
WriteConsoleW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
CreateFileW
FlushFileBuffers
InitializeCriticalSection
DeleteFileA
ReadFile
CreateFileA
SetEndOfFile
GetSystemTime
OpenFile
GetFileTime
FileTimeToSystemTime
SystemTimeToFileTime
SetFileTime
CloseHandle
HeapCreate
SetLastError
ExitThread
EncodePointer
GetStartupInfoW
HeapSetInformation
GetCommandLineA
RaiseException
HeapAlloc
DecodePointer
ExitProcess
GetProcessHeap
GetModuleHandleW
HeapFree
RtlUnwind
InterlockedExchange
GetVolumeInformationA
GetSystemInfo
VirtualAlloc
LoadLibraryA
GetProcAddress
GetConsoleWindow
CreateEventA
WaitForSingleObject
SetThreadPriority
TlsAlloc
CreateThread
WaitForMultipleObjects
GetLastError
GetModuleHandleA
UnhandledExceptionFilter
Sleep
GetCurrentThreadId
GetExitCodeThread
LeaveCriticalSection
EnterCriticalSection
SetEvent
ResetEvent
CreateEventW
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
QueryPerformanceFrequency
QueryPerformanceCounter
GetSystemTimeAsFileTime
InterlockedIncrement
InterlockedDecrement
TlsFree
TlsGetValue
TlsSetValue
user32
SendMessageA
GetClientRect
MapWindowPoints
DestroyWindow
GetDlgItem
WaitForInputIdle
UnregisterClassA
IsDialogMessageA
GetMessageA
EndDialog
SetWindowPos
DialogBoxParamA
GetParent
GetSysColorBrush
GetActiveWindow
keybd_event
GetKeyboardLayout
GetSystemMetrics
HideCaret
PeekMessageA
TranslateAcceleratorA
TranslateMDISysAccel
TranslateMessage
DispatchMessageA
WaitMessage
DefWindowProcA
BeginPaint
EndPaint
PostQuitMessage
EndDeferWindowPos
DrawFocusRect
GetDC
GetWindowLongA
SetWindowLongA
GetClassNameA
FillRect
FrameRect
ReleaseDC
GetCursorPos
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
SetWindowTextA
CreatePopupMenu
AppendMenuA
ShowWindow
UpdateWindow
gdi32
SetBkMode
TextOutA
CreateFontA
SetViewportExtEx
SetBkColor
SetBrushOrgEx
SetMapMode
SetWindowExtEx
GetCurrentObject
Escape
DeleteObject
SetViewportOrgEx
Pie
SaveDC
DPtoLP
RestoreDC
GetDeviceCaps
CreatePen
SelectObject
CreateSolidBrush
CreateHatchBrush
MoveToEx
LineTo
Ellipse
SetTextColor
shell32
SHBrowseForFolderA
SHGetFolderLocation
SHBindToParent
ole32
RevokeDragDrop
CoLockObjectExternal
CoTaskMemFree
oleaut32
RevokeActiveObject
ws2_32
sendto
send
msi
ord155
ord151
ord153
ord158
avifil32
AVIStreamStart
AVIStreamLength
crypt32
CertEnumSystemStore
comctl32
CreateToolbarEx
InitCommonControlsEx
pdh
PdhCollectQueryData
imm32
ImmSetConversionStatus
ImmGetConversionStatus
ImmGetContext
ImmReleaseContext
ImmGetDefaultIMEWnd
tapi32
linePickupA
Sections
.text Size: 322KB - Virtual size: 321KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 254KB - Virtual size: 254KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ