Behavioral task
behavioral1
Sample
053e024947a8103550e2250b51a61f65eb0a7f9a99c9c1783d5fd86ecde1d786.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
053e024947a8103550e2250b51a61f65eb0a7f9a99c9c1783d5fd86ecde1d786.exe
Resource
win10v2004-20220414-en
General
-
Target
053e024947a8103550e2250b51a61f65eb0a7f9a99c9c1783d5fd86ecde1d786
-
Size
613KB
-
MD5
25809fc57cbbfdbc64b4c5d4e17d1d06
-
SHA1
0415083490d597fc23ddc7c6e5163ad51ee60213
-
SHA256
053e024947a8103550e2250b51a61f65eb0a7f9a99c9c1783d5fd86ecde1d786
-
SHA512
a078e118303ff225c7526a844e8b0984362e7f764a473fd3599781c432280f5ef6b00eaf6c8ed2dd08bde115e66f675795a0f6769a51fbfe1a0a5e14e3f4509a
-
SSDEEP
12288:3Gfi0rOGwPLH92gDkoHE6a//cmAIr7jjNZxdk5dHe:W60rORr9jbEnxiS
Malware Config
Signatures
Files
-
053e024947a8103550e2250b51a61f65eb0a7f9a99c9c1783d5fd86ecde1d786.exe windows x86
52b75015bf1b3143b8d858eebbaf32a8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetWindowsDirectoryA
WideCharToMultiByte
GetEnvironmentStringsW
SetConsoleTitleA
SetThreadAffinityMask
UnhandledExceptionFilter
SetCommMask
GlobalFix
GetCompressedFileSizeA
ScrollConsoleScreenBufferW
SetHandleInformation
SetProcessAffinityMask
AllocateUserPhysicalPages
SetConsoleMode
lstrcatA
VirtualProtectEx
LoadLibraryExA
GetVersionExW
FindClose
FindNextFileW
DeleteFileW
FindFirstFileW
SetCurrentDirectoryW
GetCurrentDirectoryW
GetShortPathNameW
GetSystemDefaultUILanguage
LoadLibraryExW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
GetModuleHandleA
lstrcmpA
MultiByteToWideChar
LocalFree
LocalAlloc
lstrcpyW
lstrcmpW
lstrcmpiW
GlobalFree
GetLastError
GlobalAlloc
SetFileAttributesW
GetFileAttributesW
lstrcpynW
lstrlenW
ExpandEnvironmentStringsW
CreateDirectoryW
GetModuleHandleW
GetSystemDirectoryW
FreeLibrary
GetProcAddress
LoadLibraryW
ExitProcess
lstrcpynA
lstrcmpiA
VirtualAllocEx
SetErrorMode
LoadLibraryA
user32
GetDlgItemInt
VkKeyScanExA
DlgDirListComboBoxA
DlgDirListA
CreateIconIndirect
GetWindowThreadProcessId
CreateMenu
SetWindowRgn
GetMonitorInfoA
GetMessageExtraInfo
CharUpperBuffW
IsHungAppWindow
SetParent
DefDlgProcA
ModifyMenuW
SetMenuDefaultItem
GetKeyNameTextA
GetClipboardFormatNameA
InternalGetWindowText
SetMenuItemInfoA
IsWindow
GetMessagePos
FrameRect
EqualRect
GetKeyState
SetActiveWindow
IsWindowEnabled
SetClassWord
DrawStateA
GetMessageTime
MessageBoxExA
LoadImageA
EnumWindows
UnregisterClassW
GetCaretPos
MessageBoxExW
GetAncestor
GetClipboardData
SendNotifyMessageW
PackDDElParam
LoadStringW
wsprintfW
GetMenuItemInfoW
GetMenuItemCount
CreatePopupMenu
DestroyMenu
IsGUIThread
LoadIconA
gdi32
SetROP2
StartFormPage
GetWindowOrgEx
OffsetViewportOrgEx
GdiQueryTable
CreateEnhMetaFileW
GetWindowExtEx
CreateScalableFontResourceW
ArcTo
GdiProcessSetup
GetTextFaceW
GdiPlayPrivatePageEMF
RemoveFontResourceExW
EngCreateSemaphore
EngGetDriverName
SelectFontLocal
PlayMetaFileRecord
StartDocA
GdiReleaseDC
GetLogColorSpaceW
bInitSystemAndFontsDirectoriesW
CreateMetaFileW
EngTransparentBlt
SetDCBrushColor
Pie
UpdateColors
QueryFontAssocStatus
CreateHatchBrush
STROBJ_dwGetCodePage
CreateColorSpaceW
GdiIsMetaFileDC
GetTextFaceA
GetCharWidthW
PolyPatBlt
GetStockObject
CreateCompatibleDC
advapi32
RegSetValueExW
RegFlushKey
RegDeleteKeyW
RegSetValueW
RegOpenKeyExA
SetFileSecurityW
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
GetAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
RegSetKeySecurity
RegEnumKeyW
RegQueryValueW
RegDeleteValueW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegEnumValueW
RegQueryInfoKeyW
RegOpenKeyA
RegQueryValueExA
shell32
ExtractIconExW
SHGetSpecialFolderPathA
ShellExecuteA
ShellExecuteW
SHGetIconOverlayIndexA
SHBrowseForFolder
Shell_NotifyIcon
SHPathPrepareForWriteW
DragQueryFileW
ExtractAssociatedIconExW
SHGetDiskFreeSpaceA
SHQueryRecycleBinA
FindExecutableA
DoEnvironmentSubstW
DragQueryFile
SHCreateDirectoryExW
SHAddToRecentDocs
DuplicateIcon
SHFormatDrive
SHEmptyRecycleBinW
SHParseDisplayName
SHBindToParent
SHGetSpecialFolderLocation
SHChangeNotify
SHGetMalloc
SHSetLocalizedName
SHGetSpecialFolderPathW
SHGetFolderPathW
ole32
CoInitialize
OleUninitialize
OleInitialize
CoCreateInstance
CoUninitialize
shlwapi
StrChrIA
StrStrIW
StrRStrIW
StrRChrIA
PathFindExtensionW
SHDeleteKeyW
SHCopyKeyW
PathRemoveExtensionW
PathRemoveBlanksW
PathCombineW
wnsprintfW
StrCmpIW
StrToIntW
SHSetValueW
SHGetValueW
PathAddExtensionW
PathAppendW
StrCatBuffW
SHDeleteValueW
Sections
.text Size: 350KB - Virtual size: 350KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 908B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 254KB - Virtual size: 254KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ