Static task
static1
Behavioral task
behavioral1
Sample
22b4a80622e8f2d3add823865b0b54efb7c5c5182395edfb19413bd237e2ca97.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
22b4a80622e8f2d3add823865b0b54efb7c5c5182395edfb19413bd237e2ca97.exe
Resource
win10v2004-20220812-en
General
-
Target
22b4a80622e8f2d3add823865b0b54efb7c5c5182395edfb19413bd237e2ca97
-
Size
345KB
-
MD5
dbe2ef1da4b3cd8c30a32b86e957b942
-
SHA1
7e7550cdcd95c83585561913c6a3afeaf0a55a03
-
SHA256
22b4a80622e8f2d3add823865b0b54efb7c5c5182395edfb19413bd237e2ca97
-
SHA512
8973a6fb0adb2c67e6da93591f000e225c10c334a0a2c6abb3d92517c1b8a8b66f71de9fd06e88656a92c591dddae50b2aa3861cb3ed4cadfceee3ab113f083e
-
SSDEEP
6144:cx2Io706j5d1WkydEtnix8/P2Brz54Lrc+Ljy6Z4UUnvBWykQj02bUbw8HnJE:YY7lb1WdEtU8/uBrmJrUnZWyJcb3
Malware Config
Signatures
Files
-
22b4a80622e8f2d3add823865b0b54efb7c5c5182395edfb19413bd237e2ca97.exe windows x86
2f9110274684e9e27db1ed9ef06f4b7f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetForegroundWindow
DestroyMenu
PostQuitMessage
SetWindowPos
DispatchMessageA
GetDC
ReleaseDC
DestroyWindow
GetParent
UpdateWindow
ShowWindow
EnableWindow
PeekMessageA
TranslateMessage
IsWindowEnabled
LoadStringA
EnableMenuItem
RegisterClassA
CreateWindowExA
FillRect
EndPaint
SetFocus
BeginPaint
GetSystemMetrics
GetWindowRect
ReleaseCapture
SetWindowLongA
SetTimer
GetDlgItem
ScreenToClient
LoadCursorA
GetDesktopWindow
EndDialog
GetFocus
GetSysColor
IsWindowVisible
InvalidateRect
GetClientRect
SetCursor
advapi32
RegOpenKeyExA
RegCreateKeyExW
RegQueryValueExA
OpenProcessToken
RegQueryInfoKeyA
RegCloseKey
kernel32
WaitForSingleObject
GetDriveTypeA
FindNextFileA
HeapDestroy
GetFileAttributesW
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetLocaleInfoA
LocalAlloc
FreeEnvironmentStringsW
GetTempPathA
WideCharToMultiByte
GetStringTypeA
InterlockedExchange
WriteFile
GetFileAttributesA
HeapReAlloc
GetStringTypeW
SetFileAttributesA
GetOEMCP
LocalFree
GetExitCodeProcess
InitializeCriticalSection
LoadResource
FindClose
TlsGetValue
FormatMessageA
SetLastError
InterlockedDecrement
GetModuleFileNameW
HeapAlloc
FlushFileBuffers
FileTimeToSystemTime
ReleaseMutex
GetConsoleOutputCP
GetStdHandle
GetCurrentThread
GetSystemTimeAsFileTime
GetFileType
VirtualAlloc
FindResourceA
Sleep
VirtualFree
HeapCreate
IsValidCodePage
CreateProcessA
GetEnvironmentStrings
SetStdHandle
GetModuleHandleW
GetACP
CloseHandle
ReadFile
SetFilePointer
TlsFree
MapViewOfFile
RaiseException
InterlockedCompareExchange
GetCommandLineA
HeapSize
GetCurrentDirectoryA
GetCommandLineW
LockResource
GetCurrentProcessId
SizeofResource
CreateProcessW
GetCPInfo
GlobalAlloc
GlobalUnlock
GetEnvironmentStringsW
GetThreadLocale
LCMapStringA
GetConsoleCP
GlobalFree
lstrlenA
UnmapViewOfFile
LCMapStringW
GetLastError
LeaveCriticalSection
ExitProcess
CreateFileA
TlsSetValue
CreateEventA
CreateFileW
GetTimeZoneInformation
GlobalLock
FindFirstFileW
CreateFileMappingA
ResetEvent
CompareStringW
GetProcessHeap
GetSystemInfo
GetProcAddress
GetFullPathNameA
SetEvent
DeleteFileA
CreateDirectoryA
GetFileSize
GetStartupInfoA
LoadLibraryA
GetVersionExA
TlsAlloc
GetTickCount
QueryPerformanceCounter
FreeLibrary
lstrcmpiA
SetHandleCount
HeapFree
WriteConsoleW
SetCurrentDirectoryA
InterlockedIncrement
GetCurrentThreadId
CreateEventW
GetConsoleMode
VirtualQuery
GetVersion
WriteConsoleA
TerminateProcess
SetEnvironmentVariableA
MulDiv
SetUnhandledExceptionFilter
CreateThread
GetModuleHandleA
CreateMutexA
GetLocalTime
MultiByteToWideChar
UnhandledExceptionFilter
LoadLibraryExA
lstrcmpiW
GetModuleFileNameA
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 308KB - Virtual size: 308KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ