Static task
static1
Behavioral task
behavioral1
Sample
f00c68a219b7cb109796e4bd535f2d197b3be3cff5fae0dbd966f41a285e3b14.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f00c68a219b7cb109796e4bd535f2d197b3be3cff5fae0dbd966f41a285e3b14.exe
Resource
win10v2004-20220812-en
General
-
Target
f00c68a219b7cb109796e4bd535f2d197b3be3cff5fae0dbd966f41a285e3b14
-
Size
447KB
-
MD5
5d4275f6ad519c27baf61f8de3b99eff
-
SHA1
61715da4801f91b82042a7e94355102da0f07d13
-
SHA256
f00c68a219b7cb109796e4bd535f2d197b3be3cff5fae0dbd966f41a285e3b14
-
SHA512
2f174c01bbe506f406c75649a307fd42f5cd074449ccb9094343514df08d102bb3757d189c3d63ca6f59f5895be8a7a0d749c2588aa5848eb4e9ef0cb8950f8e
-
SSDEEP
12288:OAfkKMD/8+qZRNLG++W2ZBtuoPrSn35ITp1UhCCVyWrA:OVtWSv+3aT7OrA
Malware Config
Signatures
Files
-
f00c68a219b7cb109796e4bd535f2d197b3be3cff5fae0dbd966f41a285e3b14.exe windows x86
e525ab6888cbb0e26dbfc10c32508dc1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ExtractAssociatedIconW
ShellExecuteExA
DragAcceptFiles
CommandLineToArgvW
SHGetNewLinkInfo
ShellExecuteEx
SHGetFileInfo
SHInvokePrinterCommandW
SHGetDiskFreeSpaceA
RealShellExecuteExA
SHFileOperation
SHBrowseForFolderW
CheckEscapesW
gdi32
CombineTransform
RectVisible
SetColorAdjustment
GetDIBits
GdiPlayScript
advapi32
RegEnumKeyExW
RegLoadKeyW
CryptHashData
DuplicateTokenEx
CryptEnumProviderTypesA
CryptGetDefaultProviderW
InitiateSystemShutdownA
RegSetValueW
CryptEncrypt
DuplicateToken
LookupAccountSidW
CryptDestroyKey
LookupAccountNameW
CryptGetProvParam
StartServiceA
LookupPrivilegeValueW
RegQueryInfoKeyW
CryptSetProviderExW
RegOpenKeyExW
LookupSecurityDescriptorPartsA
RegRestoreKeyW
LogonUserW
CryptGetUserKey
user32
GetWindowModuleFileNameA
UnhookWindowsHookEx
MessageBoxW
UnionRect
ToAsciiEx
MessageBoxIndirectA
CharLowerW
EqualRect
SetWindowTextW
kernel32
GetPrivateProfileIntA
TerminateProcess
GetTimeFormatA
HeapFree
GetCPInfo
FindResourceExA
GetTickCount
InitializeCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStringsW
HeapAlloc
VirtualQuery
GetStringTypeW
GetLastError
ReadConsoleInputA
LockFile
GetVersionExA
GetCommandLineA
EnterCriticalSection
FreeEnvironmentStringsW
GetTempFileNameW
HeapDestroy
LocalCompact
HeapReAlloc
GetUserDefaultLCID
WideCharToMultiByte
GetPrivateProfileStructW
GetLocaleInfoW
EnumSystemLocalesA
IsValidCodePage
ExitProcess
GetCurrentProcessId
VirtualAlloc
VirtualFree
LoadLibraryA
SetHandleCount
GetModuleFileNameA
WriteFile
SetEnvironmentVariableA
GetEnvironmentStrings
LCMapStringA
GetStartupInfoA
GetCurrentThread
SetSystemTime
GetSystemInfo
UnhandledExceptionFilter
GetLocaleInfoA
TlsAlloc
CompareStringW
GetDateFormatA
LocalLock
GetCurrentProcess
GetStdHandle
HeapSize
GetCurrentThreadId
HeapCreate
TerminateThread
DeleteCriticalSection
WaitCommEvent
MultiByteToWideChar
GetSystemTimeAsFileTime
GetProcAddress
InterlockedExchange
SetLastError
TlsSetValue
GetCompressedFileSizeA
TlsGetValue
GetFileType
GetStringTypeA
SetCurrentDirectoryW
IsBadWritePtr
GetOEMCP
LeaveCriticalSection
GetNamedPipeHandleStateW
QueryPerformanceCounter
GetACP
FillConsoleOutputCharacterW
CompareStringA
TlsFree
GetModuleHandleA
EnumTimeFormatsA
VirtualProtect
LCMapStringW
IsValidLocale
RtlUnwind
GetTimeZoneInformation
SetEnvironmentVariableW
comdlg32
ReplaceTextA
GetSaveFileNameA
GetOpenFileNameA
ChooseColorA
GetFileTitleW
ChooseColorW
GetFileTitleA
ReplaceTextW
PageSetupDlgW
PrintDlgA
GetSaveFileNameW
PrintDlgW
FindTextA
GetOpenFileNameW
FindTextW
ChooseFontW
PageSetupDlgA
Sections
.text Size: 125KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 308KB - Virtual size: 307KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ