Static task
static1
Behavioral task
behavioral1
Sample
5a8918c373f87f45b0a7a954b82bdf36d978a4fa0e6834f41b5096204a6fe2ef.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5a8918c373f87f45b0a7a954b82bdf36d978a4fa0e6834f41b5096204a6fe2ef.exe
Resource
win10v2004-20220722-en
General
-
Target
5a8918c373f87f45b0a7a954b82bdf36d978a4fa0e6834f41b5096204a6fe2ef
-
Size
316KB
-
MD5
15b3a2d61092350cbaebd1f0e4323044
-
SHA1
3ca2e8069bde86e031bb8aed2042821423b6845f
-
SHA256
5a8918c373f87f45b0a7a954b82bdf36d978a4fa0e6834f41b5096204a6fe2ef
-
SHA512
2c47df346ca5ef323453c621645ce36f292c586330feb1375cdcd779ba28d70b53a9f221d442a2d7cabeacca3d244064088299a0f7ff57afc833766c99520b41
-
SSDEEP
6144:c1gCbbvXqJNEdtB7qXbTAI0e6k+rV73Qsz/oMQuMYC:cKGvXQN6Sr+rV73Qsz/oHYC
Malware Config
Signatures
Files
-
5a8918c373f87f45b0a7a954b82bdf36d978a4fa0e6834f41b5096204a6fe2ef.exe windows x86
891af63d24c52b479388c4b580e5ae4a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MapDialogRect
GetUserObjectInformationA
DefDlgProcA
GetWindowTextLengthW
TrackPopupMenu
IsZoomed
ChildWindowFromPoint
IsChild
GetMenuCheckMarkDimensions
GetClipboardFormatNameA
SendDlgItemMessageA
SystemParametersInfoW
FindWindowA
GetListBoxInfo
InvalidateRect
MessageBoxA
TranslateMessage
SetWindowLongA
PeekMessageA
MsgWaitForMultipleObjects
LoadStringA
ExitWindowsEx
DispatchMessageA
DestroyWindow
CreateWindowExA
CallWindowProcA
CharPrevA
MoveWindow
LoadImageA
LoadIconA
IsWindowVisible
GetWindowRect
GetSystemMetrics
GetParent
GetLastActivePopup
GetDC
EnumWindows
EndPaint
DestroyIcon
DefWindowProcA
CreateDialogParamA
CallNextHookEx
BeginPaint
CharUpperBuffA
CharToOemBuffA
GetKeyboardType
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
IsWindow
EnableWindow
SendMessageA
GetClientRect
FillRect
DrawTextA
ShowWindow
CreateIconFromResourceEx
GetDlgItem
RealChildWindowFromPoint
GetAncestor
IsMenu
UpdateLayeredWindow
DefFrameProcA
shell32
SHFileOperationA
ShellExecuteA
SHGetFileInfoA
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteExW
SHGetSpecialFolderLocation
ole32
CoTaskMemFree
OleInitialize
OleUninitialize
WriteClassStg
CoCreateInstance
gdi32
TextOutW
GetClipBox
IntersectClipRect
GetTextMetricsW
AnimatePalette
InvertRgn
ExtTextOutA
GetCharWidthW
ScaleViewportExtEx
GetSystemPaletteUse
PaintRgn
CreatePen
GetObjectType
SetDIBitsToDevice
PatBlt
SetTextJustification
GetMetaRgn
SetBkColor
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
netapi32
NetEnumerateComputerNames
kernel32
FreeEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
HeapCreate
GetTimeZoneInformation
TlsFree
TlsAlloc
IsValidCodePage
GetOEMCP
InterlockedDecrement
InterlockedIncrement
SetHandleCount
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetModuleHandleW
HeapFree
HeapAlloc
HeapReAlloc
GetSystemTimeAsFileTime
GetTimeFormatA
QueueUserWorkItem
LocalUnlock
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
GetEnvironmentStringsW
LocalFree
LocalAlloc
WideCharToMultiByte
TlsSetValue
TlsGetValue
MultiByteToWideChar
GetModuleHandleA
GetLastError
GetCommandLineA
WriteFile
SetFilePointer
SetEndOfFile
RtlUnwind
ReadFile
RaiseException
GetStdHandle
GetFileSize
GetSystemTime
ExitProcess
CreateFileA
CloseHandle
VirtualQuery
VirtualProtect
Sleep
SizeofResource
SetLastError
SetErrorMode
RemoveDirectoryA
LockResource
LoadResource
LoadLibraryA
IsDBCSLeadByte
GetWindowsDirectoryA
GetVersionExA
QueryPerformanceCounter
GetCurrentProcessId
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
HeapSize
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
VirtualAlloc
ExpandEnvironmentStringsA
GetUserDefaultLangID
GetSystemInfo
GetSystemDefaultLCID
GetProcAddress
GetModuleFileNameA
GetLocaleInfoA
GlobalUnlock
GetProcessHeap
ClearCommBreak
UnlockFileEx
GlobalUnWire
GetProcessWorkingSetSize
GetNamedPipeInfo
GetFileType
MulDiv
GlobalAlloc
GlobalFree
lstrcmpA
lstrcmpiA
GetVersion
lstrcatA
GlobalLock
lstrcpynA
CopyFileA
SearchPathA
CompareFileTime
CreateThread
GetStartupInfoA
lstrcpyA
lstrlenA
CompareStringA
CreateMutexA
DosDateTimeToFileTime
EnumCalendarInfoA
EnumSystemLocalesA
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindNextFileA
FlushFileBuffers
FreeEnvironmentStringsA
FreeLibrary
GetCPInfo
GetCurrentDirectoryA
GetCurrentThreadId
GetDateFormatA
GetDiskFreeSpaceA
GetDriveTypeA
GetEnvironmentStrings
GetExitCodeThread
GetFileTime
GetLocalTime
GetLocaleInfoW
GetPrivateProfileStringA
GetShortPathNameA
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
GetThreadLocale
GetTickCount
LoadLibraryExA
MoveFileA
MoveFileExA
OpenMutexA
ResumeThread
SetCurrentDirectoryA
SetFileAttributesA
SetFileTime
SuspendThread
WaitForSingleObject
WritePrivateProfileStringA
CreateDirectoryA
CreateProcessA
DeleteFileA
FindResourceA
FormatMessageA
GetACP
GetCurrentProcess
GetEnvironmentVariableA
GetExitCodeProcess
GetFileAttributesA
GetFullPathNameA
Sections
.yktjhfs Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 339KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 183KB - Virtual size: 182KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ