Static task
static1
Behavioral task
behavioral1
Sample
95f5757ec73bebcb3ff646507d7f014d391d27da0d7b9ef4c08febd5720f072a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
95f5757ec73bebcb3ff646507d7f014d391d27da0d7b9ef4c08febd5720f072a.exe
Resource
win10v2004-20220812-en
General
-
Target
95f5757ec73bebcb3ff646507d7f014d391d27da0d7b9ef4c08febd5720f072a
-
Size
368KB
-
MD5
1134a3c83843435435ca09d10b0efd2e
-
SHA1
bcb7626029ed27e1896d45570d360bf27a323aed
-
SHA256
95f5757ec73bebcb3ff646507d7f014d391d27da0d7b9ef4c08febd5720f072a
-
SHA512
1e5f5161364a6dceb1f1b5bf999dd76dbf07a8463b2960e1c46e35b97adbcb89f8fcb9d3eecd652ca6d29d2d7232cf096f89844524e19c737da4f682889b8957
-
SSDEEP
6144:yr9Qz+AXOEVzt8ULfAR9ruEDBbgeX9HyvxPaVcejyeplYRk36:MEX8ifAR9rfdFX1XVcF2YRk36
Malware Config
Signatures
Files
-
95f5757ec73bebcb3ff646507d7f014d391d27da0d7b9ef4c08febd5720f072a.exe windows x86
bdf0115817aafed72093629ea79010ed
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
InterlockedExchange
GetSystemDirectoryA
GetWindowsDirectoryA
GetModuleHandleA
CompareStringA
SetFilePointer
GetFileSize
CreateFileA
DuplicateHandle
GlobalFree
ReadFile
FileTimeToSystemTime
GlobalAlloc
LoadLibraryA
GetModuleFileNameA
lstrlenA
CopyFileA
CreateDirectoryA
FindClose
FindNextFileA
RemoveDirectoryA
SetFileAttributesA
DeleteFileA
FileTimeToDosDateTime
FindFirstFileA
GetFileInformationByHandle
GlobalMemoryStatus
GetSystemTime
FreeLibrary
WriteFile
GetCurrentProcess
FlushInstructionCache
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
RaiseException
WinExec
GetCurrentProcessId
InterlockedDecrement
CloseHandle
LoadResource
LockResource
SizeofResource
Sleep
CreateThread
IsProcessorFeaturePresent
InterlockedCompareExchange
SetEnvironmentVariableA
GetConsoleOutputCP
WriteConsoleA
GetStringTypeA
LCMapStringA
SetStdHandle
GetLastError
HeapFree
GetProcessHeap
GetVersionExA
GlobalDeleteAtom
FreeResource
GlobalUnlock
GlobalLock
MulDiv
LocalFree
lstrcmpA
EnumResourceLanguagesW
GetVersion
ConvertDefaultLocale
GetCurrentThread
InitializeCriticalSection
DeleteCriticalSection
GlobalFlags
LocalAlloc
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
InterlockedIncrement
GetThreadLocale
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
SetErrorMode
FileTimeToLocalFileTime
GetFileTime
GetTickCount
HeapAlloc
ExitProcess
RtlUnwind
HeapReAlloc
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
GetOEMCP
GetTimeZoneInformation
GetLocaleInfoA
GetConsoleCP
GetConsoleMode
advapi32
RegCloseKey
user32
MapWindowPoints
GetMessagePos
GetMessageTime
UnhookWindowsHookEx
DestroyWindow
GetTopWindow
GetDlgItem
SetActiveWindow
GetLastActivePopup
GetForegroundWindow
SetFocus
IsWindow
CallNextHookEx
GetCapture
IsChild
SendDlgItemMessageA
EndDialog
GetNextDlgTabItem
IsWindowEnabled
GetActiveWindow
GetDesktopWindow
MoveWindow
ShowWindow
SetCursor
GetWindowThreadProcessId
MapDialogRect
SetWindowContextHelpId
ValidateRect
GetCursorPos
TranslateMessage
ClientToScreen
GetSysColorBrush
ReleaseDC
GetDC
DestroyMenu
GetWindowDC
BeginPaint
EndPaint
SetCapture
ReleaseCapture
IsRectEmpty
SetRect
InvalidateRect
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
UnregisterClassA
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetClientRect
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetSysColor
AdjustWindowRectEx
EqualRect
CopyRect
PtInRect
GetDlgCtrlID
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
IsIconic
GetWindowRect
GetSystemMetrics
GetWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetFocus
GetParent
GetMenuState
EnableMenuItem
CheckMenuItem
PostQuitMessage
shell32
ShellExecuteA
SHGetMalloc
SHGetSpecialFolderLocation
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameW
PathFindExtensionW
PathStripToRootW
PathIsUNCW
PathIsDirectoryA
ole32
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
CoInitialize
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CoCreateInstance
CoGetClassObject
oleaut32
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
SysAllocString
SysFreeString
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
SysStringLen
gdi32
SetBkColor
GetDeviceCaps
DeleteObject
SaveDC
RestoreDC
SetMapMode
SetTextColor
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
GetMapMode
GetBkColor
GetRgnBox
CreateRectRgnIndirect
GetTextColor
CreateBitmap
GetStockObject
DeleteDC
ExtSelectClipRgn
winspool.drv
ClosePrinter
Sections
.text Size: 256KB - Virtual size: 254KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ