Static task
static1
Behavioral task
behavioral1
Sample
13a6bda313ed56f6c776821d270ec4352604e854cf7db8c40dae3f3f4375aed9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
13a6bda313ed56f6c776821d270ec4352604e854cf7db8c40dae3f3f4375aed9.exe
Resource
win10v2004-20220812-en
General
-
Target
13a6bda313ed56f6c776821d270ec4352604e854cf7db8c40dae3f3f4375aed9
-
Size
673KB
-
MD5
6371889cdcd19d1b88af7a5370ba6840
-
SHA1
d4db99d7e563b6c9332aba6b2de5c751185ba22e
-
SHA256
13a6bda313ed56f6c776821d270ec4352604e854cf7db8c40dae3f3f4375aed9
-
SHA512
93bcd78e6c50c08ae246ad1c510c4cdceadecec784ce10e7804dbfe9bce9cdd4d00ce8f706854319607dcd89f44e9dd2780f95b5b21a843527e82c2faefcf461
-
SSDEEP
12288:gI3q2BBYe8Zc+2/4UDiDVPYNXaf5kWGaA2XkdR1GcG0ioUf8gchawlPUpVuo:3q2fnz4g+moGE8R1G/VoUKawJaR
Malware Config
Signatures
Files
-
13a6bda313ed56f6c776821d270ec4352604e854cf7db8c40dae3f3f4375aed9.exe windows x86
752d8a1db7cd8ab247ffba957feef8de
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MapWindowPoints
DestroyWindow
DestroyMenu
PostQuitMessage
SetWindowPos
IsWindow
DispatchMessageA
GetDC
GetCursorPos
PtInRect
GetParent
ShowWindow
TranslateMessage
IsWindowEnabled
RegisterClassA
CreateWindowExA
EndPaint
SetFocus
PeekMessageA
BeginPaint
DefWindowProcA
GetSystemMetrics
GetWindowRect
ReleaseCapture
SetWindowLongA
EndDialog
SetWindowTextA
CheckMenuItem
GetDlgItem
ScreenToClient
LoadCursorA
GetDesktopWindow
SetForegroundWindow
FillRect
SetDlgItemTextA
MessageBoxA
GetSysColor
IsWindowVisible
wsprintfA
GetClientRect
CallWindowProcA
oleaut32
SysAllocString
SysFreeString
SysStringLen
kernel32
GetSystemInfo
GetStdHandle
GetConsoleOutputCP
ReleaseMutex
WaitForSingleObject
FindNextFileA
HeapDestroy
GetFileAttributesW
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetLocaleInfoA
LocalAlloc
CreateFileA
SetErrorMode
SetStdHandle
GetTempPathA
WideCharToMultiByte
lstrcmpiA
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
SetFileAttributesA
FreeLibrary
LocalFree
FormatMessageW
InitializeCriticalSection
FindClose
InterlockedDecrement
FormatMessageA
SetLastError
GetModuleFileNameW
IsDebuggerPresent
GetModuleFileNameA
LoadLibraryExA
SetConsoleCtrlHandler
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
GetLocalTime
CreateMutexA
CreateThread
SetUnhandledExceptionFilter
GetCurrentThread
GetTickCount
GetVersion
GetModuleHandleA
GetCurrentThreadId
GetCurrentProcessId
GetCommandLineA
ExitProcess
VirtualAlloc
GetLastError
FindResourceA
Sleep
VirtualFree
HeapCreate
IsValidCodePage
SizeofResource
GetModuleHandleW
GlobalLock
GetACP
CloseHandle
ReadFile
SetFilePointer
TlsFree
MapViewOfFile
RaiseException
InterlockedCompareExchange
GetCurrentDirectoryA
LockResource
GetEnvironmentStrings
lstrlenW
GlobalUnlock
GetEnvironmentStringsW
GetThreadLocale
LCMapStringA
GlobalFree
lstrlenA
LCMapStringW
LeaveCriticalSection
HeapAlloc
TlsSetValue
GetFileType
CreateEventA
CreateFileW
CreateEventW
GlobalAlloc
WaitForMultipleObjects
FindFirstFileW
CompareStringA
FindFirstFileA
CompareStringW
GetProcessHeap
GetProcAddress
GetCPInfo
GetFileSize
GetStartupInfoA
LoadLibraryA
GetVersionExA
TlsAlloc
IsBadWritePtr
QueryPerformanceCounter
GetOEMCP
LoadLibraryW
SetHandleCount
EnterCriticalSection
HeapFree
InterlockedIncrement
SetEndOfFile
GetConsoleMode
VirtualQuery
WriteConsoleA
TerminateProcess
SetEnvironmentVariableA
Sections
.text Size: 637KB - Virtual size: 963KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ