Static task
static1
Behavioral task
behavioral1
Sample
54f2f42438f1845360ab3cf93f603273d457712dfcd93f14fca4e303eef84021.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
54f2f42438f1845360ab3cf93f603273d457712dfcd93f14fca4e303eef84021.exe
Resource
win10v2004-20220812-en
General
-
Target
54f2f42438f1845360ab3cf93f603273d457712dfcd93f14fca4e303eef84021
-
Size
692KB
-
MD5
8acf2313324f63503ef38584b1c167d7
-
SHA1
7f0b1a904db44e1af37cf60de2d9b288f3b4b4ac
-
SHA256
54f2f42438f1845360ab3cf93f603273d457712dfcd93f14fca4e303eef84021
-
SHA512
a1340a27cc01e606b135fd5496422a1fe6745616fad15ed1fc2ccc38b78a04d828776fe9a43b1f17029b855b7e09daf96ce4f47e42986d6eacf5386c7e99869c
-
SSDEEP
12288:/xFV5ycp1jwWhgOHvbO9IS8bQ576ZiufjcDIbtMMfPbEDyGi4:pT5ysRHvbOyvsp6ZZfjc0btMMfjEd
Malware Config
Signatures
Files
-
54f2f42438f1845360ab3cf93f603273d457712dfcd93f14fca4e303eef84021.exe windows x86
ab3d86f59d05f6872a1e3bf766f8accf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
OleSetClipboard
CoLockObjectExternal
IsAccelerator
OleCreateMenuDescriptor
OleCreateFromData
WriteClassStg
OleDestroyMenuDescriptor
StgIsStorageFile
CLSIDFromProgID
CoTaskMemFree
OleSaveToStream
OleTranslateAccelerator
CreateOleAdviseHolder
StgOpenStorage
CoRegisterMessageFilter
shell32
ord155
DragAcceptFiles
SHGetPathFromIDListA
DragQueryFileW
version
VerQueryValueA
GetFileVersionInfoSizeA
user32
SystemParametersInfoW
CopyRect
SetWindowLongW
EndDeferWindowPos
DispatchMessageW
SendDlgItemMessageW
GetClipboardData
SetDlgItemInt
InflateRect
GetDCEx
GetMessagePos
IsWindowVisible
RemoveMenu
SetScrollInfo
SetClipboardData
DrawIconEx
LoadCursorW
DrawEdge
RegisterClassW
RegisterClassExW
ShowOwnedPopups
ChildWindowFromPoint
LockWindowUpdate
SetCursor
BringWindowToTop
IsRectEmpty
GetSystemMenu
CreateWindowExW
LoadAcceleratorsW
OpenClipboard
IsChild
DrawMenuBar
MapWindowPoints
SetMenuDefaultItem
LoadStringW
IsZoomed
LoadBitmapW
GetFocus
GetMenuItemID
CloseClipboard
wsprintfW
MessageBoxW
GetDlgItem
GetSubMenu
GetParent
UpdateWindow
SetRectEmpty
RedrawWindow
ReleaseCapture
LoadMenuW
GetSysColor
PtInRect
CallNextHookEx
WaitMessage
GetWindowTextW
CopyIcon
UnionRect
InvalidateRgn
MoveWindow
ScrollWindowEx
KillTimer
SetFocus
FrameRect
SetMenuItemInfoW
CreateDialogIndirectParamW
InvalidateRect
EmptyClipboard
IsMenu
SetActiveWindow
SetForegroundWindow
DrawFocusRect
GetAsyncKeyState
ShowWindow
GetScrollInfo
GetWindowDC
DefWindowProcW
IsWindowEnabled
UnhookWindowsHookEx
GetTopWindow
GetIconInfo
IntersectRect
GetClassInfoExW
PostQuitMessage
CharUpperW
GetMonitorInfoW
SetRect
IsIconic
GetClassNameW
EqualRect
GetMenuItemCount
SetWindowPos
ShowScrollBar
GetWindowRect
CallWindowProcW
UnregisterClassA
DestroyIcon
SetWindowsHookExW
GetMenuState
EndDialog
GetForegroundWindow
DrawFrameControl
ReleaseDC
SetTimer
FillRect
TranslateMessage
DestroyMenu
AttachThreadInput
GetSystemMetrics
IsWindow
ScreenToClient
GetWindow
SetWindowPlacement
DestroyWindow
GetMessageW
GetDlgCtrlID
ClientToScreen
MessageBeep
RegisterWindowMessageW
BeginDeferWindowPos
GetKeyState
GetClientRect
EnumChildWindows
IsClipboardFormatAvailable
UnpackDDElParam
PostMessageW
SetParent
AdjustWindowRectEx
SystemParametersInfoA
gdi32
GetStockObject
GetObjectW
SetBkColor
StretchBlt
CombineRgn
ExtSelectClipRgn
TextOutW
GetPixel
DeleteObject
CreateDIBSection
RestoreDC
Rectangle
RectVisible
CreateSolidBrush
SetPolyFillMode
GetBkColor
SetROP2
SetWindowOrgEx
StartPage
BitBlt
DeleteDC
SaveDC
CreateDCW
GetDeviceCaps
LineTo
ExtFloodFill
GetTextExtentPoint32W
GetMapMode
GetTextMetricsW
SetAbortProc
EndDoc
SelectObject
EqualRgn
CreateEllipticRgn
EndPage
PtVisible
RealizePalette
kernel32
IsBadWritePtr
GetOEMCP
GetCurrentThreadId
HeapCreate
RtlUnwind
LoadLibraryA
WriteFile
GetCPInfo
VirtualProtect
GetCurrentProcess
TlsGetValue
CompareStringA
UnhandledExceptionFilter
DeleteCriticalSection
VirtualAlloc
GetModuleFileNameW
GetModuleFileNameA
TlsSetValue
FreeEnvironmentStringsA
IsValidCodePage
SetFilePointer
SetEnvironmentVariableA
IsValidLocale
GetCurrentProcessId
InterlockedExchange
VirtualFree
HeapReAlloc
LCMapStringA
FreeEnvironmentStringsW
SetStdHandle
GetProcAddress
FlushFileBuffers
GetStringTypeA
CloseHandle
CompareStringW
SetLastError
GetDateFormatA
GetModuleHandleA
GetStartupInfoW
GetLocaleInfoW
GetCommandLineW
MultiByteToWideChar
GetStringTypeW
GetFileType
TlsFree
ExitProcess
ReadFile
TerminateProcess
GetSystemTimeAsFileTime
VirtualQuery
GetEnvironmentStringsW
GetStdHandle
GetTickCount
GetEnvironmentStrings
GetCommandLineA
InitializeCriticalSection
TlsAlloc
FatalAppExitA
SetHandleCount
GetCurrentThread
WideCharToMultiByte
GetModuleHandleW
HeapFree
EnterCriticalSection
GetVersionExA
GetTimeZoneInformation
CreateMutexW
GetLocaleInfoA
HeapDestroy
GetStartupInfoA
QueryPerformanceCounter
HeapAlloc
GetSystemInfo
GetACP
GetLastError
GetTimeFormatA
LeaveCriticalSection
GetUserDefaultLCID
LCMapStringW
HeapSize
shlwapi
PathStripToRootW
PathFindFileNameW
PathFileExistsW
Sections
.text Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 454KB - Virtual size: 454KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ