Static task
static1
Behavioral task
behavioral1
Sample
43b71f25462bd30f56d2d0621d72212d0d57e60d6b19e85910997188bfef960b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
43b71f25462bd30f56d2d0621d72212d0d57e60d6b19e85910997188bfef960b.exe
Resource
win10v2004-20220812-en
General
-
Target
43b71f25462bd30f56d2d0621d72212d0d57e60d6b19e85910997188bfef960b
-
Size
167KB
-
MD5
d465a0811fec0b2bd626ec6b95ed6080
-
SHA1
3a6b0042a70b54cb1d3fe80e41f2eea2607981df
-
SHA256
43b71f25462bd30f56d2d0621d72212d0d57e60d6b19e85910997188bfef960b
-
SHA512
fa56d487e9cea7e2c3bd799a9ecebfa37b13d3da96efa1f101747f17b311158cb5e34cce0bd7a226d863ee00f68abd9ec3326a92cd720f57eb26403c36f64cce
-
SSDEEP
3072:VBJE40+j3315rZhom7jhG6Wt800O9a1HBA+iZ7I:fCF+/XoVGHO9Qhu
Malware Config
Signatures
Files
-
43b71f25462bd30f56d2d0621d72212d0d57e60d6b19e85910997188bfef960b.exe windows x86
01ebfe6f94a76a3d23ee96152419f618
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetClientRect
GetMenuItemID
MapVirtualKeyA
ScrollWindow
GetCapture
SetScrollInfo
SetClipboardData
GetCursor
SetForegroundWindow
CallNextHookEx
IsRectEmpty
GetWindowDC
SystemParametersInfoA
DrawEdge
PeekMessageA
SetRect
DrawIcon
EnumChildWindows
RemovePropA
ClientToScreen
DispatchMessageA
EndPaint
GetSystemMenu
UpdateWindow
GetParent
GetScrollPos
OffsetRect
EnableScrollBar
CharNextA
GetTopWindow
SetCapture
SetWindowLongA
SetWindowPlacement
GetWindowPlacement
ShowWindow
IsIconic
InvalidateRect
LoadBitmapA
EnableMenuItem
DestroyCursor
DrawFrameControl
KillTimer
GetDC
GetClassNameA
CreatePopupMenu
LoadKeyboardLayoutA
GetIconInfo
DrawAnimatedRects
CheckMenuItem
CharLowerBuffA
PeekMessageW
BeginPaint
FillRect
GetDlgItem
GetMenuItemCount
SetParent
GetScrollInfo
MessageBoxA
SetPropA
DrawMenuBar
DrawIconEx
SetClassLongA
CloseClipboard
CreateMenu
SetCursor
IsWindowEnabled
CharLowerA
GetPropA
PtInRect
SetScrollRange
CharNextW
TranslateMDISysAccel
CreateWindowExA
CallWindowProcA
MessageBeep
DefFrameProcA
CharUpperBuffA
wsprintfA
IsChild
SendMessageA
FindWindowA
ChildWindowFromPoint
AdjustWindowRectEx
OpenClipboard
DestroyMenu
GetWindow
UnhookWindowsHookEx
TrackPopupMenu
DispatchMessageW
WindowFromPoint
GetLastActivePopup
GetForegroundWindow
SetActiveWindow
ReleaseDC
GetMenuStringA
ShowOwnedPopups
LoadIconA
CreateIcon
IsDialogMessageA
ActivateKeyboardLayout
GetWindowLongW
IntersectRect
GetKeyboardType
LoadCursorA
GetKeyState
GetSubMenu
IsDialogMessageW
InsertMenuA
InsertMenuItemA
RegisterClassA
EnumWindows
GetMenuItemInfoA
EnumThreadWindows
SetWindowsHookExA
EmptyClipboard
MoveWindow
GetFocus
LoadStringA
GetClipboardData
GetSystemMetrics
SetWindowTextA
GetDCEx
PostMessageA
SetMenuItemInfoA
RemoveMenu
DestroyWindow
IsWindow
GetKeyboardLayoutList
ScreenToClient
IsWindowVisible
GetMenu
PostQuitMessage
GetKeyboardLayoutNameA
GetDesktopWindow
GetSysColorBrush
ReleaseCapture
GetWindowLongA
UnregisterClassA
GetClassInfoA
ShowScrollBar
WaitMessage
GetWindowRect
CharToOemA
DefWindowProcA
SendMessageW
GetActiveWindow
GetKeyNameTextA
SetScrollPos
MapWindowPoints
FrameRect
MsgWaitForMultipleObjects
IsZoomed
SetMenu
DefMDIChildProcA
RegisterClipboardFormatA
EnableWindow
SetWindowPos
RedrawWindow
EqualRect
RegisterWindowMessageA
OemToCharA
GetKeyboardState
GetMessagePos
DeleteMenu
TranslateMessage
GetMenuState
DrawTextA
GetClassLongA
SetTimer
GetScrollRange
msvcrt
sin
memmove
memcpy
wcstol
kernel32
WideCharToMultiByte
lstrcpyA
GetStartupInfoA
ExitProcess
GetLocalTime
MulDiv
EnumCalendarInfoA
LoadLibraryExA
GetVersion
VirtualFree
GetFileAttributesA
ResetEvent
GetCPInfo
GetCurrentProcess
GetFileSize
lstrcpynA
GetDiskFreeSpaceA
LockResource
lstrlenA
GetModuleHandleA
GetTickCount
FindClose
CreateEventA
WaitForSingleObject
GlobalAlloc
GetProcessHeap
GetFileType
FreeLibrary
GetModuleFileNameA
GetLastError
MoveFileExA
LoadResource
GetDateFormatA
GetOEMCP
GlobalAddAtomA
GetEnvironmentStrings
DeleteCriticalSection
lstrcmpiA
GetFullPathNameA
CreateThread
MoveFileA
SetHandleCount
SetEvent
ExitThread
Sleep
GetUserDefaultLCID
VirtualQuery
ReadFile
SetErrorMode
GlobalDeleteAtom
GetCurrentThread
GetSystemDefaultLangID
FormatMessageA
LoadLibraryA
GetVersionExA
EnterCriticalSection
SetLastError
GetThreadLocale
GetCurrentThreadId
LocalAlloc
HeapFree
WriteFile
FindResourceA
lstrcatA
HeapDestroy
SetEndOfFile
GetStringTypeA
CreateFileA
GetLocaleInfoA
GetCurrentProcessId
CompareStringA
GetACP
GetStdHandle
GetCommandLineA
lstrcmpA
FreeResource
GetStringTypeW
InitializeCriticalSection
LocalReAlloc
VirtualAlloc
DeleteFileA
RaiseException
FindFirstFileA
SetThreadLocale
SizeofResource
SetFilePointer
HeapAlloc
LocalFree
GlobalFindAtomA
Sections
.text Size: 155KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.edata Size: 7KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE