Static task
static1
Behavioral task
behavioral1
Sample
5f5b2501b23fd3efceffa161bb51b9721a10f583e85e10a287faa170d847e1cc.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
5f5b2501b23fd3efceffa161bb51b9721a10f583e85e10a287faa170d847e1cc.exe
Resource
win10v2004-20220722-en
General
-
Target
5f5b2501b23fd3efceffa161bb51b9721a10f583e85e10a287faa170d847e1cc
-
Size
342KB
-
MD5
1363011ce43fdadbff9360a2e2716731
-
SHA1
d980ddf282aa7170c38caaa4fe73d05cf04d9fe6
-
SHA256
5f5b2501b23fd3efceffa161bb51b9721a10f583e85e10a287faa170d847e1cc
-
SHA512
355c654a7226f6c68367f0ede1f294d84f5f2d8b70757c9c0b20546589971b5534d67b0a99360acca7d5a0251aca0339b55226e859d5d53637a5491533072feb
-
SSDEEP
6144:wlOK1RBZgYK6aOtAOv49cXWF8eM0jF47fodLQdq71wsMrMYNVnL:wT16YKitccXWjTvLQdu1nMrvnL
Malware Config
Signatures
Files
-
5f5b2501b23fd3efceffa161bb51b9721a10f583e85e10a287faa170d847e1cc.exe windows x86
1dadc2818969de8d5c043b592be08a2c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
InvalidateRect
IsCharAlphaW
NotifyWinEvent
IsCharUpperW
GetClipboardSequenceNumber
GetMessageExtraInfo
ExcludeUpdateRgn
OpenClipboard
GetClipboardFormatNameA
GetKBCodePage
GetSystemMetrics
ScreenToClient
GetMessagePos
CallWindowProcW
IsWindowVisible
LoadBitmapW
CloseClipboard
SetClipboardData
EmptyClipboard
TrackPopupMenu
GetWindowRect
AppendMenuW
CreatePopupMenu
EndDialog
EnableMenuItem
GetSystemMenu
SetClassLongW
IsWindowEnabled
SetWindowPos
DialogBoxParamW
CheckDlgButton
CreateWindowExW
SystemParametersInfoW
RegisterClassW
SetDlgItemTextW
GetDlgItemTextW
MessageBoxIndirectW
CharNextA
CharUpperW
CharPrevW
DispatchMessageW
wsprintfA
DestroyWindow
CreateDialogParamW
SetTimer
SetWindowTextW
PostQuitMessage
SetForegroundWindow
ShowWindow
wsprintfW
SendMessageTimeoutW
LoadCursorW
SetCursor
GetWindowLongW
CharNextW
ExitWindowsEx
FindWindowExW
GetDlgItem
SetWindowLongW
LoadImageW
GetDC
SetWindowLongA
PostMessageA
PeekMessageW
GetClassInfoW
PeekMessageA
EndPaint
GetMessageW
SendMessageW
CallWindowProcA
SendMessageA
OffsetRect
SetWindowTextA
GetWindowContextHelpId
GetAltTabInfoA
GetUserObjectInformationA
CreateIconFromResource
GetSysColor
GetClassLongW
CreateIconFromResourceEx
IsGUIThread
OemKeyScan
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHFileOperationW
ShellExecuteW
SHGetFileInfoW
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetFolderPathA
ole32
OleUninitialize
CoCreateInstance
CoLockObjectExternal
CoTaskMemFree
OleInitialize
CoGetMalloc
advapi32
RegDeleteKeyA
RegEnumValueW
SetFileSecurityW
gdi32
CreateRectRgn
PlayMetaFile
Arc
ExtTextOutW
GetViewportExtEx
SetRectRgn
GetEnhMetaFileHeader
RectVisible
SetBitmapBits
SetMapMode
UpdateICMRegKeyA
GetCharWidthFloatW
GetDIBColorTable
GetRandomRgn
GetColorSpace
GdiGetBatchLimit
PtInRegion
ModifyWorldTransform
GetDeviceGammaRamp
RectInRegion
GetCharABCWidthsFloatW
Escape
GetCharWidthI
ExtEscape
GetViewportOrgEx
PolyPolyline
GetDeviceCaps
comctl32
ImageList_Create
ImageList_Destroy
ImageList_AddMasked
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
netapi32
NetWkstaTransportAdd
kernel32
VirtualFree
HeapCreate
GetTimeZoneInformation
HeapFree
GetCurrentThreadId
SetLastError
TlsSetValue
TlsAlloc
GetProcAddress
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
DeleteCriticalSection
GetFileType
GetStdHandle
SetHandleCount
LeaveCriticalSection
EnterCriticalSection
GetStartupInfoA
GetCommandLineA
HeapAlloc
HeapSize
GetSystemTimeAsFileTime
VirtualAlloc
GetTimeFormatA
SetFileTime
CompareFileTime
SearchPathW
GetShortPathNameW
GetFullPathNameW
MoveFileW
SetCurrentDirectoryW
GetFileAttributesW
GetLastError
CreateDirectoryW
SetFileAttributesW
Sleep
GetTickCount
CreateFileW
GetFileSize
GetModuleFileNameW
GetCurrentProcess
CopyFileW
ExitProcess
GetWindowsDirectoryW
GetTempPathW
GetCommandLineW
SetErrorMode
CloseHandle
lstrlenW
lstrcpyW
GetVersionExW
GetSystemDirectoryW
RaiseException
CreateFileA
CompareStringA
GetModuleHandleA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
LoadLibraryA
FlushFileBuffers
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
GetDateFormatA
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
HeapReAlloc
UnlockFileEx
GetVersion
lstrcpyA
RemoveDirectoryW
lstrcmpiW
lstrcmpW
ExpandEnvironmentStringsW
GetFileInformationByHandle
RequestWakeupLatency
GetLogicalDrives
LocalShrink
FindFirstFileExW
SetMessageWaitingIndicator
IsValidLocale
TlsFree
FreeResource
SetThreadContext
TlsGetValue
GetFileTime
GetExitCodeThread
VirtualProtectEx
GlobalSize
TryEnterCriticalSection
GetLongPathNameW
GetThreadContext
DebugSetProcessKillOnExit
VirtualProtect
DeleteFileA
lstrcpynA
DeleteFileW
FindFirstFileW
FindNextFileW
FindClose
SetFilePointer
MultiByteToWideChar
ReadFile
WriteFile
lstrlenA
MulDiv
WideCharToMultiByte
GetPrivateProfileStringW
WritePrivateProfileStringW
FreeLibrary
LoadLibraryExW
GetModuleHandleW
GlobalFree
GetExitCodeProcess
WaitForSingleObject
GlobalAlloc
Sections
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 345KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 195KB - Virtual size: 195KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ