Static task
static1
Behavioral task
behavioral1
Sample
5607414907c0494f734000ba029c6b74a0eafdf2bfbecc24d410855108635100.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5607414907c0494f734000ba029c6b74a0eafdf2bfbecc24d410855108635100.exe
Resource
win10v2004-20220721-en
General
-
Target
5607414907c0494f734000ba029c6b74a0eafdf2bfbecc24d410855108635100
-
Size
382KB
-
MD5
432ad4941c057927786e3b6646ecf2f3
-
SHA1
45babe449954544219054e327523de5812597eaa
-
SHA256
5607414907c0494f734000ba029c6b74a0eafdf2bfbecc24d410855108635100
-
SHA512
8b8fa755cf8a18fe7a822edcb977e8d8ee7615ccc56f5eac5c4eb7113f1faa8c983a9da18a08923c7e14d1bc86f2cae7d0a98322e8fcb8fb180733c0e9b04ab3
-
SSDEEP
6144:Xds/dKcl7SiNbuI+Nn2IcuY0JGQZjcxCf:XdQSiNbuIU2fY/ZjcxCf
Malware Config
Signatures
Files
-
5607414907c0494f734000ba029c6b74a0eafdf2bfbecc24d410855108635100.exe windows x86
7e65b8bab91b6706e2b83ca4ed05ff37
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFileTime
SetTapePosition
SetVolumeMountPointW
SizeofResource
TerminateThread
WaitForSingleObject
WriteFile
WritePrivateProfileSectionA
_lclose
SetFilePointer
_lopen
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpyW
lstrcpynA
lstrlenA
SetFileAttributesA
SetEvent
SetCurrentDirectoryA
SetComputerNameExW
ScrollConsoleScreenBufferA
ResetWriteWatch
ResetEvent
RemoveDirectoryA
ReadFile
OpenJobObjectA
Module32NextW
LockResource
LocalFree
LocalFileTimeToFileTime
LocalAlloc
LoadResource
LoadLibraryExA
LoadLibraryA
IsDBCSLeadByte
GlobalUnlock
GlobalLock
GlobalFree
GlobalAlloc
GetWindowsDirectoryA
GetVolumeInformationA
GetVersionExA
GetTempPathA
GetTempFileNameA
GetSystemInfo
GetSystemDirectoryA
GetShortPathNameA
GetPrivateProfileStringA
GetPrivateProfileIntA
GetModuleFileNameA
GetLastError
GetFileAttributesA
GetExitCodeProcess
GetDriveTypeA
GetDiskFreeSpaceA
GetCurrentProcess
GetCurrentDirectoryA
GetConsoleScreenBufferInfo
GetConsoleAliasExesLengthA
GetCommandLineA
FreeResource
FreeLibrary
FormatMessageA
FindResourceA
FindNextFileA
FindFirstFileA
FindClose
FillConsoleOutputCharacterW
ExitProcess
EnumTimeFormatsW
EnumLanguageGroupLocalesA
DosDateTimeToFileTime
DeleteFileA
CreateWaitableTimerW
CreateThread
CreateProcessA
CreateMutexA
CreateIoCompletionPort
CreateFileA
CreateEventA
CreateDirectoryA
CompareStringA
CloseHandle
BuildCommDCBAndTimeoutsA
BackupRead
AddConsoleAliasW
GetModuleHandleW
GetProcessHeap
GetStartupInfoA
LoadLibraryW
GetModuleHandleA
_llseek
GetProcAddress
user32
wsprintfA
WindowFromPoint
UpdateLayeredWindow
TrackPopupMenu
SwitchDesktop
ShowWindow
SetWindowsHookW
SetWindowTextA
SetWindowPos
SetWindowLongA
SetForegroundWindow
SetDlgItemTextW
SetDlgItemTextA
SendNotifyMessageA
SendMessageW
SendMessageCallbackW
SendMessageA
SendDlgItemMessageA
ScrollWindowEx
ReleaseDC
ReleaseCapture
RegisterHotKey
RegisterClipboardFormatW
PostMessageW
PeekMessageA
OpenWindowStationW
OpenIcon
OemKeyScan
MsgWaitForMultipleObjects
MessageBoxIndirectA
MessageBoxA
MessageBeep
LookupIconIdFromDirectory
LoadStringA
LoadMenuA
LoadKeyboardLayoutW
IsClipboardFormatAvailable
IsCharAlphaNumericW
InflateRect
IMPGetIMEW
GetWindowTextLengthW
GetWindowTextA
GetWindowModuleFileNameA
GetWindowLongA
GetMenuStringW
GetListBoxInfo
GetGuiResources
GetForegroundWindow
GetDlgItemTextA
GetDlgItem
GetDesktopWindow
GetDC
GetClipboardSequenceNumber
GetClassNameW
GetClassLongA
FindWindowW
FillRect
ExitWindowsEx
EnumChildWindows
EndDialog
EnableWindow
DrawTextW
DlgDirSelectComboBoxExW
DispatchMessageA
DialogBoxIndirectParamA
DdeQueryStringA
DdeNameService
DdeKeepStringHandle
CharUpperA
CharToOemBuffW
CharPrevA
CharNextExA
CharNextA
CallWindowProcA
LoadBitmapW
LoadIconA
LoadCursorW
GetWindowRect
gdi32
EnumFontFamiliesExW
EnumICMProfilesW
FONTOBJ_pfdg
GdiInitializeLanguagePack
GetClipBox
GetCurrentObject
GetDIBits
GetDeviceCaps
GetMetaFileW
GetNearestPaletteIndex
GetObjectType
GetObjectW
GetPaletteEntries
CreatePalette
GetStockObject
Polygon
RealizePalette
ResizePalette
SelectPalette
SetBkMode
GetGraphicsMode
SetMetaFileBitsEx
SetStretchBltMode
StretchBlt
StretchDIBits
XLATEOBJ_iXlate
CreateHalftonePalette
CreateDIBSection
CreateCompatibleBitmap
CLIPOBJ_cEnumStart
BitBlt
SelectObject
CreateCompatibleDC
GdiFlush
CreatePatternBrush
GetDCPenColor
FillPath
DeleteDC
EndDoc
DeleteEnhMetaFile
CreateMetaFileW
GetDCBrushColor
GetEnhMetaFileA
GetBkMode
GetRandomRgn
GetBkColor
DeleteColorSpace
GetFontLanguageInfo
GetColorSpace
FlattenPath
DeleteMetaFile
EndPath
CreateSolidBrush
DeleteObject
EndPage
GetEnhMetaFileW
advapi32
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
LookupAccountSidW
GetUserNameW
GetTokenInformation
FreeSid
EqualSid
DuplicateTokenEx
AllocateAndInitializeSid
AdjustTokenPrivileges
RegQueryValueExW
RegOpenKeyA
RegSetValueExA
shell32
ShellExecuteW
ShellExecuteEx
SHInvokePrinterCommandW
SHGetSpecialFolderPathW
SHGetPathFromIDListW
SHGetFolderLocation
SHCreateDirectoryExW
shlwapi
StrStrIW
winmm
timeGetTime
Sections
.text Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 261KB - Virtual size: 261KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ