Static task
static1
Behavioral task
behavioral1
Sample
55fbf80d14708a4f8e22680cf7d1f792e50030e497fca32e189944df20da9a92.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
55fbf80d14708a4f8e22680cf7d1f792e50030e497fca32e189944df20da9a92.exe
Resource
win10v2004-20220901-en
General
-
Target
55fbf80d14708a4f8e22680cf7d1f792e50030e497fca32e189944df20da9a92
-
Size
65KB
-
MD5
c4e0ededa91f97d5a5e696bbfb53cd64
-
SHA1
a2a621b00798d8467af66bb0f6c1e49e07c8fb27
-
SHA256
55fbf80d14708a4f8e22680cf7d1f792e50030e497fca32e189944df20da9a92
-
SHA512
f3e84fd91deb6f1519030deff66c6ff088e033d183718ded94019af2f091091b8a65171204a56110a98b2cb75d94184b8da8fd71c8f762730397cf2649b9b6a2
-
SSDEEP
1536:sY8S3CM/BR6ARLGm2TTn2HEYX+qcuJeNm3p0rm:sY8S3CM/BwwL52TwX+8UMwm
Malware Config
Signatures
Files
-
55fbf80d14708a4f8e22680cf7d1f792e50030e497fca32e189944df20da9a92.exe windows x86
a7abd57383770c3b172508aa2dcb7d41
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
urlmon
URLDownloadToFileW
kernel32
CloseHandle
MultiByteToWideChar
lstrcmpiW
CreateMutexA
WaitForSingleObject
DeleteFileW
CreateProcessW
ReleaseMutex
CreateThread
HeapFree
SizeofResource
LoadResource
GlobalAlloc
GlobalLock
LockResource
GlobalUnlock
SetErrorMode
ExitProcess
ReadFile
HeapAlloc
GetProcessHeap
GetFileSize
CreateFileW
GetProcAddress
LoadLibraryW
GetModuleFileNameW
CreateDirectoryW
lstrlenW
GetModuleHandleW
lstrcpynW
lstrcatW
lstrcpyW
lstrlenA
lstrcatA
WideCharToMultiByte
FindResourceW
user32
FillRect
InvalidateRect
GetDlgItemTextW
MapWindowPoints
SetWindowTextA
SetWindowPos
GetWindowRect
EnableWindow
ReleaseDC
GetDC
MessageBoxA
DialogBoxParamW
GetSysColorBrush
GetSysColor
ShowWindow
SetDlgItemTextW
GetDlgItem
EndDialog
LoadIconW
SetWindowTextW
SendMessageW
SetDlgItemTextA
SetTimer
PostMessageW
gdi32
DeleteDC
SetTextColor
SetBkColor
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetStockObject
CreateFontIndirectW
GetObjectW
GetDeviceCaps
DeleteObject
advapi32
RegSetValueExW
RegDeleteValueW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
shell32
SHGetSpecialFolderPathW
ShellExecuteW
SHBrowseForFolderW
SHGetPathFromIDListW
ShellExecuteA
SHGetMalloc
Shell_NotifyIconW
ole32
CreateStreamOnHGlobal
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
OleLoadPicture
ntdll
_allmul
memset
memcpy
_aulldiv
_aulldvrm
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ