Static task
static1
Behavioral task
behavioral1
Sample
12ebf5605d8950fe1bccd8ebc2351a596b501fc8e9bfcc2bc7959281bcf30768.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
12ebf5605d8950fe1bccd8ebc2351a596b501fc8e9bfcc2bc7959281bcf30768.exe
Resource
win10v2004-20220812-en
General
-
Target
12ebf5605d8950fe1bccd8ebc2351a596b501fc8e9bfcc2bc7959281bcf30768
-
Size
169KB
-
MD5
f619c3a20caafcf9d34677a4812a6211
-
SHA1
9cc05768ea7283a15c224808fb907fe04a0090d3
-
SHA256
12ebf5605d8950fe1bccd8ebc2351a596b501fc8e9bfcc2bc7959281bcf30768
-
SHA512
5d9d6c8551fde3c19d722fa50172c0c3370282a814c9bed127c76a633434a688a9d4daf687db8e78a493c35dfbd0d427ffeb03a077a214c48017a53fe708b42c
-
SSDEEP
3072:23IaG3GvqMxUCL8p8yEsRnmkfym8l9/6vxeRMFPpywjPRabvDOVsuwLU:2D/vP3ihEynmkf98lBeeOpPjIHOV6
Malware Config
Signatures
Files
-
12ebf5605d8950fe1bccd8ebc2351a596b501fc8e9bfcc2bc7959281bcf30768.exe windows x86
c7b0cb5ab6f0ed81ee4e67424964dcf0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
_wcsnicmp
RtlDeleteCriticalSection
atol
user32
GetDesktopWindow
CheckMenuItem
GetFocus
DrawEdge
EnableWindow
GetMenuStringA
IsDialogMessageA
IsChild
GetMessagePos
BeginDeferWindowPos
GetClientRect
DefWindowProcA
EqualRect
IsMenu
FrameRect
GetIconInfo
GetClassLongA
DrawIconEx
DrawMenuBar
GetScrollRange
DrawIcon
DispatchMessageW
ShowScrollBar
ShowWindow
GetMenuState
SetTimer
GetCursor
GetMenuItemID
CharNextA
CreatePopupMenu
GetKeyNameTextA
TrackPopupMenu
EnableMenuItem
DrawTextA
EndPaint
ClientToScreen
GetLastActivePopup
GetSysColor
CreateMenu
GetDlgItem
GetKeyState
GetScrollInfo
GetScrollPos
GetCapture
GetActiveWindow
SetCursor
GetDC
DispatchMessageA
HideCaret
EnableScrollBar
FindWindowA
GetMenuItemInfoA
GetClipboardData
EnumThreadWindows
DefMDIChildProcA
CharLowerBuffA
CharLowerA
SetWindowTextA
GetWindow
GetSubMenu
GetClassInfoA
RegisterClassA
EnumWindows
SetWindowPos
GetMenu
SetWindowLongA
SystemParametersInfoA
GetParent
CallWindowProcA
EndDeferWindowPos
CharToOemA
IsWindowVisible
GetDCEx
DefFrameProcA
GetSysColorBrush
CreateIcon
msvcrt
tolower
memset
atol
strncmp
calloc
strlen
strcmp
memmove
sqrt
memcpy
wcschr
malloc
kernel32
lstrcatA
GetSystemDefaultLangID
MoveFileExA
GetCurrentThread
DeleteFileA
GetThreadLocale
GetEnvironmentStrings
GetUserDefaultLCID
MoveFileA
GlobalFindAtomA
GlobalAddAtomA
GetLastError
GetLocalTime
EnterCriticalSection
CreateFileA
GetModuleFileNameA
lstrcpyA
GetFileSize
SetHandleCount
FormatMessageA
GetOEMCP
HeapFree
GetStringTypeA
GetLocaleInfoA
GlobalDeleteAtom
SetLastError
LoadLibraryA
CompareStringA
LocalAlloc
FreeResource
lstrcmpiA
WaitForSingleObject
SetFilePointer
LoadLibraryExA
GetDateFormatA
GetVersionExA
CloseHandle
GetCommandLineA
GetProcAddress
GetTickCount
FindResourceA
RaiseException
LocalReAlloc
VirtualFree
GetCurrentProcess
GetModuleHandleA
ExitThread
lstrlenA
SizeofResource
InitializeCriticalSection
DeleteCriticalSection
MulDiv
WriteFile
GetDiskFreeSpaceA
GetCurrentThreadId
GetCPInfo
CreateThread
GlobalAlloc
VirtualAllocEx
lstrcpynA
WideCharToMultiByte
GetVersion
SetThreadLocale
Sleep
FindClose
VirtualAlloc
GetProcessHeap
lstrcmpA
GetACP
GetStartupInfoA
LocalFree
EnumCalendarInfoA
ExitProcess
FindFirstFileA
LockResource
ole32
OleRun
CoTaskMemFree
CLSIDFromProgID
StgOpenStorage
CLSIDFromString
CoRegisterClassObject
GetHGlobalFromStream
CreateBindCtx
StgCreateDocfileOnILockBytes
Sections
CODE Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 110KB - Virtual size: 157KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE