Static task
static1
Behavioral task
behavioral1
Sample
501a12070e9b88976668fe71f22b74eb94b3acdc15e28f651ee496d27b3e3e58.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
501a12070e9b88976668fe71f22b74eb94b3acdc15e28f651ee496d27b3e3e58.exe
Resource
win10v2004-20220718-en
General
-
Target
501a12070e9b88976668fe71f22b74eb94b3acdc15e28f651ee496d27b3e3e58
-
Size
636KB
-
MD5
5ad17f673ae8220a7d6c4311e5ccebec
-
SHA1
7b3b40b2672682fa3159ee854571964dcf912f7d
-
SHA256
501a12070e9b88976668fe71f22b74eb94b3acdc15e28f651ee496d27b3e3e58
-
SHA512
d076a6b2a9a5a98074bda17df1cdc3056a14fa1ead49de13ce1ea778f8317b36393fda3c6656f8cc5b4ca7ea258775416ea9fe57a33049d17ba634827bd1ecf3
-
SSDEEP
12288:/kMGLco9X/MKg1tU8J5FpH9SPEWH2lUD9zFwk+Ii39:/wLcoaKIU8NpH9SPEWJEd99
Malware Config
Signatures
Files
-
501a12070e9b88976668fe71f22b74eb94b3acdc15e28f651ee496d27b3e3e58.exe windows x86
018107ad82844590428f615642dea9fb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
RegisterClassExA
RegisterClassA
RedrawWindow
PostMessageA
PeekMessageA
OffsetRect
OemToCharBuffA
MoveWindow
MessageBoxA
LoadStringA
LoadImageA
LoadIconA
IsWindowVisible
GetWindowRect
GetSystemMetrics
GetParent
GetLastActivePopup
GetDlgItem
GetDC
ExitWindowsEx
EnumWindows
EndPaint
DispatchMessageA
DestroyWindow
DestroyIcon
DefWindowProcA
CreateWindowExA
CreateDialogParamA
CallNextHookEx
BeginPaint
CharUpperBuffA
CharToOemBuffA
kernel32
GetSystemDirectoryA
HeapSize
LCMapStringW
LCMapStringA
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
RtlUnwind
HeapReAlloc
VirtualAlloc
InitializeCriticalSection
Sleep
GetOEMCP
GetACP
EnterCriticalSection
LeaveCriticalSection
QueryPerformanceCounter
VirtualFree
HeapCreate
HeapDestroy
DeleteCriticalSection
GetFileType
CreateProcessA
DeleteFileA
DosDateTimeToFileTime
EnumCalendarInfoA
EnumSystemLocalesA
ExpandEnvironmentStringsA
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FlushFileBuffers
FormatMessageA
FreeEnvironmentStringsA
FreeLibrary
GetCPInfo
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentThreadId
GetDateFormatA
GetDiskFreeSpaceA
GetDriveTypeA
GetEnvironmentStrings
GetEnvironmentVariableA
GetExitCodeProcess
GetExitCodeThread
GetFileAttributesA
GetFileSize
GetFileTime
GetFullPathNameA
GetLastError
GetLocalTime
GetLocaleInfoA
GetLocaleInfoW
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileStringA
GetProcAddress
GetShortPathNameA
GetTempFileNameA
GetTempPathA
GetThreadLocale
GetTickCount
GetVersionExA
GetWindowsDirectoryA
LoadLibraryA
LoadLibraryExA
LoadResource
LockResource
MoveFileA
VirtualAllocEx
OpenProcess
GetCurrentProcessId
FreeUserPhysicalPages
GetSystemTimeAsFileTime
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 593KB - Virtual size: 724KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ