Static task
static1
Behavioral task
behavioral1
Sample
1e17b6c883b4dcaaa9603504f1a6ca66c051e4dc84a018b06f772b4a823fa10a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1e17b6c883b4dcaaa9603504f1a6ca66c051e4dc84a018b06f772b4a823fa10a.exe
Resource
win10v2004-20220812-en
General
-
Target
1e17b6c883b4dcaaa9603504f1a6ca66c051e4dc84a018b06f772b4a823fa10a
-
Size
1.4MB
-
MD5
4b9189b33be0a342f403144040042fb3
-
SHA1
e41aa1798307a79070208819949cb7c7209be93a
-
SHA256
1e17b6c883b4dcaaa9603504f1a6ca66c051e4dc84a018b06f772b4a823fa10a
-
SHA512
217b8235852ae4ce1175a1ecf3434d4fb1589dc68670c4a12710f1d5bd1d78edfc105aa0d137c1c4522d28ef48d8b9b57aeac25181ba47bd2bbafb89bb2cc8d1
-
SSDEEP
24576:BGV0vwvsxdyx/jNzr2plquvQul7A83BynHw+eVxOyvqnqPF4m8y0d8ztKPxAiA3d:BZvwjx/jNzr2PD3IQ+eVknG4Ry0S5knO
Malware Config
Signatures
Files
-
1e17b6c883b4dcaaa9603504f1a6ca66c051e4dc84a018b06f772b4a823fa10a.exe windows x86
158f624568d5deb5fb6d99e5b63b9e6e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RemoveDirectoryA
ReadFile
WriteFile
SetFilePointer
lstrcpyA
ExitProcess
GetFileSize
GetModuleHandleA
GetCommandLineA
GetTickCount
SetFileAttributesA
lstrcatA
GetFileTime
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetWindowsDirectoryA
GetShortPathNameA
CreateDirectoryA
GetTempPathA
GetSystemDirectoryA
MultiByteToWideChar
MoveFileA
CreateFileA
lstrlenA
GetFileAttributesA
GetDiskFreeSpaceA
CompareFileTime
GetModuleFileNameA
CloseHandle
SetFileTime
CreateProcessA
WaitForSingleObject
FreeLibrary
GetExitCodeProcess
LoadLibraryA
SetEndOfFile
CreateThread
GlobalFree
FindClose
GlobalAlloc
Sleep
lstrcmpiA
GetPrivateProfileStringA
GetProcAddress
FindNextFileA
DeleteFileA
FindFirstFileA
WritePrivateProfileStringA
user32
DialogBoxParamA
SetTimer
SetDlgItemTextA
CreateDialogParamA
GetDesktopWindow
IsWindowEnabled
MessageBoxA
wsprintfA
IsWindowVisible
EndDialog
FindWindowA
SendMessageA
SendDlgItemMessageA
GetDlgItemTextA
GetParent
LoadIconA
SetClassLongA
GetDlgItem
GetWindowRect
ScreenToClient
SetWindowPos
EnableWindow
PeekMessageA
LoadBitmapA
DispatchMessageA
DestroyWindow
SetFocus
ShowWindow
SetForegroundWindow
SetWindowTextA
gdi32
DeleteObject
LineTo
MoveToEx
CreatePen
BitBlt
SelectObject
CreateCompatibleDC
TextOutA
GetStockObject
SetBkColor
GetTextMetricsA
GetNearestColor
CreateBrushIndirect
SetTextColor
advapi32
RegDeleteValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
RegCloseKey
RegCreateKeyA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
shell32
SHBrowseForFolderA
ShellExecuteA
SHFileOperationA
SHGetMalloc
SHGetPathFromIDListA
ole32
OleInitialize
OleUninitialize
CoCreateInstance
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
comctl32
ord17
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ