Static task
static1
Behavioral task
behavioral1
Sample
ca9ad48be1945aaf69037c9f027ea2c384ed6e5870f75d2e95d5820f538f5c6a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ca9ad48be1945aaf69037c9f027ea2c384ed6e5870f75d2e95d5820f538f5c6a.exe
Resource
win10v2004-20220812-en
General
-
Target
ca9ad48be1945aaf69037c9f027ea2c384ed6e5870f75d2e95d5820f538f5c6a
-
Size
164KB
-
MD5
ae4e94bf7098c01533f5783e13882386
-
SHA1
57d3430e4077b87ba1b1718557724c1da93d94ed
-
SHA256
ca9ad48be1945aaf69037c9f027ea2c384ed6e5870f75d2e95d5820f538f5c6a
-
SHA512
71b216ceaa2242bff7f0dcb55cb67e14e9f4879e2179178abf1cc95b1f161db16e7e905b65771753d9b0ff5bad4b10e5d6087a41bd2f0e6346d5168a4f8abfa4
-
SSDEEP
3072:bNJZHE90ciDuG6o20ahDZGvoW68j5LEfgJq/mUWtAW+HQ4:R3k9GuG6oSHGgWfLEat1+HH
Malware Config
Signatures
Files
-
ca9ad48be1945aaf69037c9f027ea2c384ed6e5870f75d2e95d5820f538f5c6a.exe windows x86
3707168cad751bda774f335c4cbf1e50
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetClipboardData
IntersectRect
GetForegroundWindow
DrawMenuBar
CheckMenuItem
RegisterWindowMessageA
GetWindowLongW
CharLowerBuffA
SetScrollRange
WaitMessage
DrawTextA
KillTimer
MoveWindow
GetDCEx
IsDialogMessageW
ScrollWindow
CharNextA
GetSysColor
GetMenuStringA
GetPropA
RemoveMenu
EnumThreadWindows
MessageBeep
IsWindow
CharUpperBuffA
GetDesktopWindow
InsertMenuItemA
OffsetRect
GetKeyboardLayout
ShowWindow
LoadCursorA
GetMenuItemID
OpenClipboard
AdjustWindowRectEx
SetWindowTextA
GetKeyboardLayoutList
FindWindowA
EmptyClipboard
ShowOwnedPopups
DispatchMessageA
GetFocus
GetTopWindow
SetClassLongA
SetWindowPos
GetKeyboardType
SetScrollPos
FrameRect
IsChild
EnumWindows
GetMenuItemInfoA
CreatePopupMenu
GetMenuState
GetMenuItemCount
EnableWindow
LoadStringA
GetKeyState
IsWindowUnicode
FillRect
SetWindowPlacement
LoadBitmapA
GetWindowDC
EnumChildWindows
GetKeyboardLayoutNameA
SetCapture
DeleteMenu
DrawIconEx
SetRect
SetCursor
DestroyIcon
DrawAnimatedRects
SetWindowsHookExA
EnableScrollBar
PeekMessageW
TrackPopupMenu
UnregisterClassA
EqualRect
IsWindowEnabled
GetDlgItem
LoadKeyboardLayoutA
DefWindowProcA
SetMenu
GetIconInfo
MsgWaitForMultipleObjects
GetSubMenu
GetKeyNameTextA
RegisterClipboardFormatA
ChildWindowFromPoint
SetTimer
IsZoomed
DrawEdge
LoadIconA
GetSystemMetrics
SetParent
DestroyWindow
GetSysColorBrush
PtInRect
EnableMenuItem
wsprintfA
TranslateMessage
CreateMenu
GetWindowLongA
InflateRect
GetLastActivePopup
InvalidateRect
GetCursorPos
EndPaint
SetForegroundWindow
DestroyMenu
BeginPaint
PostMessageA
InsertMenuA
ReleaseDC
DefFrameProcA
ShowScrollBar
SetPropA
SendMessageA
GetMessagePos
UnhookWindowsHookEx
DispatchMessageW
ReleaseCapture
CallNextHookEx
IsDialogMessageA
SetWindowLongW
CreateIcon
GetClientRect
RemovePropA
SystemParametersInfoA
GetWindowRect
GetActiveWindow
PeekMessageA
GetWindowThreadProcessId
IsWindowVisible
GetParent
UpdateWindow
CallWindowProcA
SetActiveWindow
DefMDIChildProcA
MessageBoxA
GetDC
ClientToScreen
GetScrollPos
TranslateMDISysAccel
WindowFromPoint
RegisterClassA
GetMenu
CharLowerA
ActivateKeyboardLayout
DrawIcon
CreateWindowExA
GetClassInfoA
DestroyCursor
IsRectEmpty
GetClipboardData
DrawFrameControl
GetScrollInfo
SetFocus
GetWindowPlacement
GetSystemMenu
SetScrollInfo
OemToCharA
MapWindowPoints
GetCapture
GetWindow
RedrawWindow
SendMessageW
GetScrollRange
GetClassLongA
GetKeyboardState
PostQuitMessage
GetCursor
CharNextW
GetWindowTextA
kernel32
GetFileSize
SetErrorMode
GetSystemDefaultLangID
MoveFileExA
WaitForSingleObject
HeapFree
SetEndOfFile
CreateEventA
GetOEMCP
SetLastError
GetFileAttributesA
MoveFileA
HeapAlloc
GetProcessHeap
MulDiv
LoadLibraryExA
ResetEvent
GetEnvironmentStrings
DeleteFileA
LoadResource
GetVersion
GetACP
GetLastError
lstrcmpA
GetTickCount
lstrcpyA
VirtualFree
GetStartupInfoA
GetThreadLocale
GetModuleFileNameA
FindClose
LockResource
FindFirstFileA
GetCPInfo
GetCurrentProcess
VirtualQuery
FreeLibrary
VirtualAllocEx
CreateThread
GlobalFindAtomA
GetDiskFreeSpaceA
GetProcAddress
SetFilePointer
ExitThread
GlobalAlloc
DeleteCriticalSection
GetCurrentThread
LocalAlloc
Sleep
FormatMessageA
GlobalAddAtomA
WriteFile
CompareStringA
LoadLibraryA
WideCharToMultiByte
CloseHandle
GetLocaleInfoA
InitializeCriticalSection
HeapDestroy
VirtualAlloc
GlobalDeleteAtom
ReadFile
ExitProcess
lstrlenA
FreeResource
CreateFileA
SetEvent
lstrcmpiA
GetVersionExA
SetThreadLocale
lstrcpynA
GetStdHandle
EnterCriticalSection
LocalFree
GetDateFormatA
GetLocalTime
FindResourceA
GetModuleHandleA
LocalReAlloc
GetCurrentThreadId
SizeofResource
msvcrt
srand
sin
memmove
memcpy
Sections
CODE Size: 150KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ