Static task
static1
Behavioral task
behavioral1
Sample
4a489b065fd62603262231513c393755359ec2daae4e6a8b0e046a92b3427c78.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4a489b065fd62603262231513c393755359ec2daae4e6a8b0e046a92b3427c78.exe
Resource
win10v2004-20220812-en
General
-
Target
4a489b065fd62603262231513c393755359ec2daae4e6a8b0e046a92b3427c78
-
Size
770KB
-
MD5
8d49fe695c1fc1f9b809eb12d0893568
-
SHA1
44b477919b8822f1a4bf4c4782644397c312e4fa
-
SHA256
4a489b065fd62603262231513c393755359ec2daae4e6a8b0e046a92b3427c78
-
SHA512
d9142142f1384ff4ca8782f0cae75691461fb4bacabb0c8c724f11eb5cda9347456091525238424543c2463f68a240f6c77c06f1c31287f3851f8edcce7c4b84
-
SSDEEP
12288:vBPXqcRA4v9TFbACBI3y6fZniIxdTJeefQvok7s4DQy86wbOSKTec1tK:vBSMACTMxi0T3YvokRDQytwbOSue+tK
Malware Config
Signatures
Files
-
4a489b065fd62603262231513c393755359ec2daae4e6a8b0e046a92b3427c78.exe windows x86
56fa6a3e1a9067ed2df1c2bd7bd0883b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CloseClipboard
PostQuitMessage
AppendMenuW
GetClassInfoW
CallNextHookEx
RegisterWindowMessageW
BeginPaint
LoadStringW
SetCursor
GetMessageW
PostMessageW
WindowFromPoint
TranslateMessage
SetWindowPos
InsertMenuItemW
SetMenuItemInfoW
DrawFrameControl
GetMenuStringW
MessageBeep
CreateMenu
ReleaseCapture
SendMessageA
MessageBoxA
ShowWindow
BeginDeferWindowPos
SetDlgItemTextW
TrackPopupMenu
DefWindowProcW
InsertMenuW
MapWindowPoints
GetWindowThreadProcessId
TrackPopupMenuEx
GetMenuItemCount
CheckMenuItem
GetFocus
ScreenToClient
InvalidateRect
EnableMenuItem
SetWindowTextW
ReleaseDC
CopyRect
DeleteMenu
IsRectEmpty
GetSysColor
SendMessageW
GetDlgItem
GetCapture
CallWindowProcW
IntersectRect
SystemParametersInfoA
RedrawWindow
FrameRect
DestroyWindow
DrawTextW
LoadCursorW
GetClientRect
SetClipboardData
EndDialog
GetParent
SetRectEmpty
GetCursorPos
SetMenu
IsChild
EnumWindows
OffsetRect
GetWindowRect
GetScrollInfo
GetDlgItemInt
AdjustWindowRectEx
RegisterClassW
GetWindowDC
GetClassNameW
IsZoomed
EndPaint
CreateWindowExW
GetDoubleClickTime
GetMenuItemID
DrawIconEx
GetForegroundWindow
InflateRect
IsIconic
GetWindowLongW
RegisterClipboardFormatW
SystemParametersInfoW
DrawEdge
FindWindowW
PtInRect
IsMenu
GetSystemMetrics
SetScrollPos
wsprintfW
EnumChildWindows
SetWindowLongW
GetWindowTextW
SetParent
RemoveMenu
IsWindowVisible
GetNextDlgTabItem
LoadImageW
DestroyCursor
EnableWindow
UnhookWindowsHookEx
DispatchMessageW
SetCapture
IsDlgButtonChecked
GetSysColorBrush
OpenClipboard
EndDeferWindowPos
LoadIconW
RegisterClassExW
MapVirtualKeyW
GetWindowTextLengthW
EmptyClipboard
GetMenuState
DrawFocusRect
CreatePopupMenu
SetTimer
GetDC
MessageBoxW
shell32
SHBrowseForFolderA
SHGetMalloc
DragAcceptFiles
SHGetPathFromIDListA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
comctl32
ImageList_Draw
ImageList_Destroy
InitCommonControlsEx
ImageList_Add
gdi32
Arc
ExtFloodFill
GetPolyFillMode
CreateFontIndirectA
SetPolyFillMode
CreateSolidBrush
ScaleViewportExtEx
SetROP2
Pie
FrameRgn
CreatePatternBrush
DeleteMetaFile
GetStretchBltMode
CreatePalette
GetRgnBox
ScaleWindowExtEx
SetBkColor
GetViewportExtEx
SetViewportExtEx
SelectPalette
BitBlt
UnrealizeObject
Escape
GetBoundsRect
CopyMetaFileA
GetPaletteEntries
MaskBlt
Rectangle
ole32
CLSIDFromString
OleIsCurrentClipboard
StgCreateDocfileOnILockBytes
OleInitialize
StgOpenStorageOnILockBytes
CoTaskMemAlloc
CreateILockBytesOnHGlobal
CoGetClassObject
kernel32
TlsSetValue
TerminateProcess
GetEnvironmentStringsW
GetCurrentProcess
TlsGetValue
GetStdHandle
VirtualAlloc
CompareStringW
FlushFileBuffers
GetSystemTimeAsFileTime
RaiseException
GetFileType
TlsFree
TlsAlloc
InterlockedDecrement
InterlockedExchange
GetACP
HeapAlloc
HeapFree
HeapValidate
GetEnvironmentStrings
OutputDebugStringA
IsBadReadPtr
GetCurrentProcessId
GetProcAddress
CreateMutexW
MultiByteToWideChar
LeaveCriticalSection
IsBadCodePtr
InterlockedIncrement
SetStdHandle
GetStartupInfoW
WriteFile
WideCharToMultiByte
GetLocaleInfoA
HeapReAlloc
HeapDestroy
ExitProcess
GetVersionExA
IsBadWritePtr
LCMapStringW
RtlUnwind
InitializeCriticalSection
DeleteCriticalSection
LoadLibraryA
GetStringTypeA
GetTickCount
LoadLibraryW
EnterCriticalSection
ReadFile
UnhandledExceptionFilter
SetHandleCount
FreeEnvironmentStringsA
GetLastError
GetModuleHandleA
GetStringTypeW
VirtualQuery
SetEnvironmentVariableA
FreeEnvironmentStringsW
LCMapStringA
GetCommandLineW
CloseHandle
GetDateFormatA
CompareStringA
SetLastError
GetSystemInfo
GetOEMCP
GetStartupInfoA
VirtualFree
GetCPInfo
QueryPerformanceCounter
DebugBreak
GetTimeZoneInformation
GetTimeFormatA
VirtualProtect
GetModuleFileNameA
GetCommandLineA
GetModuleFileNameW
GetModuleHandleW
HeapCreate
SetFilePointer
GetCurrentThreadId
SetUnhandledExceptionFilter
Sections
.text Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 477KB - Virtual size: 477KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ