Static task
static1
Behavioral task
behavioral1
Sample
54dbfdb9c79902b7c4d8e912e23208076551e14c9bb3531f4ff2486df390ef8c.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
54dbfdb9c79902b7c4d8e912e23208076551e14c9bb3531f4ff2486df390ef8c.exe
Resource
win10v2004-20220722-en
General
-
Target
54dbfdb9c79902b7c4d8e912e23208076551e14c9bb3531f4ff2486df390ef8c
-
Size
659KB
-
MD5
21656ef176bee004042a3439b37d4159
-
SHA1
1e8b981b43a753a8fadd68138a46544ea860488e
-
SHA256
54dbfdb9c79902b7c4d8e912e23208076551e14c9bb3531f4ff2486df390ef8c
-
SHA512
f58560d20650335dfb9382f0400b6ffe2c37788385e55188342a581814f7ac24fef29bd95107dfbe307828b7c4cc40f5668d0abba187d9ca36b9f9498ecc1cfe
-
SSDEEP
12288:iOsvFH95amMODqg5UI8F6i2rWxU5JC85bdjsX6Da4:iRvFd5gmkJ8AEXDv
Malware Config
Signatures
Files
-
54dbfdb9c79902b7c4d8e912e23208076551e14c9bb3531f4ff2486df390ef8c.exe windows x86
3d079d647b8c397f2f8c601f74944edb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetUpdateRect
GetWindow
GetWindowDC
GetWindowLongA
GetWindowPlacement
GetWindowRect
GetWindowTextA
DdeGetLastError
kernel32
GetTickCount
SetEnvironmentVariableA
CompareStringW
CompareStringA
HeapSize
LCMapStringW
LCMapStringA
GetStringTypeA
GetProcAddress
DeleteFileW
FindNextFileW
RemoveDirectoryW
lstrlenW
GetSystemTimeAsFileTime
lstrcmpW
lstrlenA
ExpandEnvironmentStringsW
CreateDirectoryW
GetLastError
GetFileAttributesW
FindFirstFileW
FindClose
CompareFileTime
WideCharToMultiByte
MultiByteToWideChar
TlsGetValue
TlsFree
TlsAlloc
SuspendThread
Sleep
SizeofResource
SetThreadPriority
SetThreadLocale
SetLastError
SetHandleCount
SetFilePointer
SetEvent
SetErrorMode
SetEndOfFile
SetConsoleCtrlHandler
RtlUnwind
ResumeThread
ResetEvent
ReadFile
RaiseException
QueryPerformanceFrequency
QueryPerformanceCounter
OutputDebugStringA
MulDiv
LockResource
LocalFree
LocalAlloc
LoadResource
LoadLibraryExA
LoadLibraryA
LeaveCriticalSection
IsValidCodePage
InitializeCriticalSection
HeapFree
HeapAlloc
GlobalUnlock
GlobalSize
GlobalReAlloc
GlobalMemoryStatus
GlobalLock
GlobalHandle
GlobalFree
GlobalFindAtomA
GlobalDeleteAtom
GlobalAlloc
GlobalAddAtomA
GetWindowsDirectoryA
GetVersionExA
GetVersion
GetThreadLocale
GetTempPathA
GetTempFileNameA
GetSystemInfo
GetStringTypeW
GetStringTypeExA
GetStdHandle
GetStartupInfoA
GetProfileStringA
GetProcessHeap
GetPrivateProfileStringA
GetOEMCP
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLocalTime
GetFullPathNameA
GetFileType
GetFileSize
GetFileAttributesA
GetExitCodeThread
GetEnvironmentStrings
GetDiskFreeSpaceA
GetDateFormatA
GetCurrentThreadId
GetCurrentProcessId
GetCommandLineA
GetCPInfo
GetACP
FreeResource
FreeLibrary
FormatMessageA
FindResourceA
FindNextFileA
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExitThread
HeapReAlloc
TlsSetValue
InterlockedIncrement
InterlockedDecrement
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
EnterCriticalSection
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
GetTimeZoneInformation
ExitProcess
WriteFile
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStringsW
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 607KB - Virtual size: 738KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ