Type
Static task
static1
Behavioral task
behavioral1
Sample
5c3e231c8ca3e0c8cb679599d70f8642614f3895cdf3b4c25de0f0c46d83c1ec.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
5c3e231c8ca3e0c8cb679599d70f8642614f3895cdf3b4c25de0f0c46d83c1ec.exe
Resource
win10v2004-20220722-en
General
-
Target
5c3e231c8ca3e0c8cb679599d70f8642614f3895cdf3b4c25de0f0c46d83c1ec
-
Size
484KB
-
MD5
812db304d3c512908f8392487341f8d6
-
SHA1
4ceb748ca2cade684c838f165643a1931ad3bc24
-
SHA256
5c3e231c8ca3e0c8cb679599d70f8642614f3895cdf3b4c25de0f0c46d83c1ec
-
SHA512
a2255a2db88fab255a345a866dc39c679e4a4b04e33ec697265ebcaadbd9d2bf78f9e0d473ebe9732539539d6677f4b4a5deaa6d181b28ace5a934a4a92340e8
-
SSDEEP
12288:lfiVXyHTJSAP2DfhxssBXNOESOggJ9/vBO:AVXeSbhLXAJgJfO
Malware Config
Signatures
Files
-
5c3e231c8ca3e0c8cb679599d70f8642614f3895cdf3b4c25de0f0c46d83c1ec.exe windows x86
b0f0df8eb33306d193099451ea603b1e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_WDM_DRIVER
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetLocaleInfoA
GetUserDefaultLCID
HeapSize
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetLocaleInfoW
LoadLibraryW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetFilePointer
GetModuleFileNameW
IsProcessorFeaturePresent
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
HeapCreate
TerminateProcess
EnumSystemLocalesA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SetHandleCount
GetCPInfo
MultiByteToWideChar
LCMapStringW
WideCharToMultiByte
RtlUnwind
RaiseException
GetStartupInfoW
HeapSetInformation
GetCommandLineA
ExitProcess
GetModuleHandleW
GetFileType
InitializeCriticalSectionAndSpinCount
SetStdHandle
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DecodePointer
EncodePointer
InterlockedDecrement
InterlockedIncrement
Sleep
GlobalAlloc
WriteFile
GetProcessHeap
GetTickCount
IsValidLocale
GetStringTypeW
HeapReAlloc
WriteConsoleW
CreateFileW
GetCurrentProcessId
CloseHandle
GetCurrentThreadId
FillConsoleOutputAttribute
GetModuleHandleA
GetConsoleScreenBufferInfo
LoadLibraryA
GetProcAddress
GetLastError
GetStdHandle
ReadFile
IsDebuggerPresent
SetConsoleCursorPosition
SetConsoleScreenBufferSize
HeapFree
HeapAlloc
FillConsoleOutputCharacterA
CreateFileA
GetCurrentProcess
user32
GetWindowDC
CopyRect
DrawFrameControl
GetDlgItemTextA
ClientToScreen
DestroyWindow
GetUserObjectInformationA
EnableWindow
GetSystemMetrics
PostMessageA
SetThreadDesktop
CreatePopupMenu
SetMenu
SetWindowPos
GetSysColor
SendMessageTimeoutA
DefWindowProcA
CreateWindowExA
GetWindowLongA
InvalidateRect
SetWindowLongA
GetWindowTextA
OffsetRect
TranslateMessage
EnumDisplayMonitors
SetProcessWindowStation
GetWindowRect
CreateDialogParamA
InsertMenuItemA
PostQuitMessage
SetActiveWindow
GetThreadDesktop
DrawTextA
CloseWindowStation
LoadBitmapA
ChildWindowFromPointEx
CreateDesktopA
GetProcessWindowStation
FindWindowW
GetClientRect
SetFocus
CloseDesktop
GetWindowTextLengthA
SendMessageA
gdi32
DeleteDC
CreateFontA
CreateFontIndirectA
ExcludeClipRect
DeleteObject
SelectObject
CreateCompatibleDC
CombineRgn
CreateCompatibleBitmap
CreateRectRgn
Polyline
CreatePen
GetPixel
GetObjectA
GetStockObject
BitBlt
comdlg32
GetOpenFileNameA
advapi32
DuplicateTokenEx
LookupAccountNameW
RegEnumKeyExA
shell32
SHGetMalloc
ExtractIconExA
oleaut32
SysAllocString
SysFreeString
ws2_32
closesocket
WSACleanup
WSAAsyncSelect
accept
comctl32
ImageList_Create
ImageList_Add
InitCommonControlsEx
ImageList_ReplaceIcon
pdh
PdhCloseLog
PdhAddCounterW
PdhUpdateLogA
PdhCloseQuery
PdhOpenLogA
PdhOpenQueryA
PdhAddCounterA
PdhCollectQueryData
PdhGetFormattedCounterValue
setupapi
SetupDiGetDeviceInstallParamsA
SetupDiSetDeviceInstallParamsA
SetupDiSetDeviceRegistryPropertyA
wtsapi32
WTSQuerySessionInformationW
WTSFreeMemory
WTSEnumerateProcessesA
uxtheme
DrawThemeBackground
Exports
Exports
Sections
.text Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 125KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.relob Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ