Static task
static1
Behavioral task
behavioral1
Sample
56c468b1e011978cc513c74e8191cd4279fe7b744c97b5c0f381caef43c30422.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
56c468b1e011978cc513c74e8191cd4279fe7b744c97b5c0f381caef43c30422.exe
Resource
win10v2004-20220721-en
General
-
Target
56c468b1e011978cc513c74e8191cd4279fe7b744c97b5c0f381caef43c30422
-
Size
266KB
-
MD5
685a2cb5212c9a5b9208fb41fbc98ac7
-
SHA1
f6d3c90573427a3e68f744f8e0ebada395525e25
-
SHA256
56c468b1e011978cc513c74e8191cd4279fe7b744c97b5c0f381caef43c30422
-
SHA512
33f8da6eb65810fe24611afef0f0e575e41e430645283bc59c69be0cd07ac3fafa3823ae468be0a98c40423e1baf851b2882f5c017bb879f30319b1bbdb6bf45
-
SSDEEP
6144:JotdVuP15hRiLw2R1lGxf5BgRGnSSUlSnSSUlR:kdU2R1lGzBgsSSUlSSSUl
Malware Config
Signatures
Files
-
56c468b1e011978cc513c74e8191cd4279fe7b744c97b5c0f381caef43c30422.exe windows x86
21406280e74e2173a7f55a813603ea96
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
GlobalGetAtomNameA
lstrcmpA
LoadLibraryA
FlushFileBuffers
GetCurrentProcess
LocalAlloc
GlobalFlags
GetCurrentThreadId
GetLocaleInfoA
GlobalDeleteAtom
GetVersionExA
lstrcmpW
GlobalFindAtomA
GetCPInfo
GetOEMCP
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
GetCommandLineA
RtlUnwind
RaiseException
VirtualAlloc
HeapReAlloc
HeapSize
ExitProcess
GetACP
IsValidCodePage
HeapCreate
VirtualFree
GetConsoleCP
GetConsoleMode
GetStdHandle
SetHandleCount
GetFileType
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetCurrentProcessId
FreeLibrary
InterlockedDecrement
InterlockedIncrement
GetModuleHandleA
GetModuleHandleW
GetProcAddress
CompareStringA
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MultiByteToWideChar
OutputDebugStringA
SetFileTime
WriteFile
CreateDirectoryA
GetFileAttributesA
LocalFileTimeToFileTime
GetCurrentDirectoryA
SystemTimeToFileTime
SetFilePointer
CreateFileA
lstrlenA
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
GetTempPathA
GetModuleFileNameA
GetWindowsDirectoryA
Sleep
ReadFile
CloseHandle
CreateProcessA
GetStartupInfoA
CreatePipe
GetLastError
GlobalAddAtomA
CreateMutexA
user32
WinHelpA
RegisterWindowMessageA
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
DestroyMenu
MapWindowPoints
SetMenu
GetClientRect
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
CallWindowProcA
GetMenu
SystemParametersInfoA
GetWindowPlacement
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
SetForegroundWindow
IsIconic
PostMessageA
SetWindowPos
IsWindow
GetDlgItem
SetWindowsHookExA
CallNextHookEx
GetKeyState
PeekMessageA
ValidateRect
GetFocus
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
GetWindowTextA
GetWindowThreadProcessId
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
UnhookWindowsHookEx
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetCapture
GetClassLongA
SetPropA
GetPropA
DispatchMessageA
LoadIconA
LoadCursorA
CreateWindowExA
DestroyWindow
DefWindowProcA
PostQuitMessage
wsprintfA
RemovePropA
GetForegroundWindow
GetTopWindow
GetMessageTime
SetWindowLongA
GetMessagePos
advapi32
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
shell32
ShellExecuteA
urlmon
URLDownloadToFileA
wininet
InternetConnectA
InternetOpenA
InternetCloseHandle
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetQueryDataAvailable
InternetReadFile
oleacc
LresultFromObject
CreateStdAccessibleObject
gdi32
DeleteDC
GetStockObject
DeleteObject
CreateBitmap
GetClipBox
SetTextColor
SetBkColor
SaveDC
RestoreDC
SetMapMode
SetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
ScaleWindowExtEx
ScaleViewportExtEx
SelectObject
SetViewportExtEx
OffsetViewportOrgEx
GetDeviceCaps
SetViewportOrgEx
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ