Static task
static1
Behavioral task
behavioral1
Sample
2498516d23abb08ddb2658bcef525a3eeffd58b477e2f4899887a53705272e58.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2498516d23abb08ddb2658bcef525a3eeffd58b477e2f4899887a53705272e58.exe
Resource
win10v2004-20220812-en
General
-
Target
2498516d23abb08ddb2658bcef525a3eeffd58b477e2f4899887a53705272e58
-
Size
308KB
-
MD5
6f9968fb7e47bd8207f3cf0f80c2d180
-
SHA1
ef55fd8155f85662227acfb6c2824a75788a583d
-
SHA256
2498516d23abb08ddb2658bcef525a3eeffd58b477e2f4899887a53705272e58
-
SHA512
e2cab42addd07e5cc490608777473cc49e2676689160e1bce0b6da093a834fae33feb99601b362bd35a9f4321c59f88ff9b55db02c4859ce155dd3957e57b22d
-
SSDEEP
6144:+idWnmC4Jx5gce3GkNRZyS/iKctMJtZf3Ja+yOG26U8zk:jQnmCm2lNyYi29Za+yOGbzk
Malware Config
Signatures
Files
-
2498516d23abb08ddb2658bcef525a3eeffd58b477e2f4899887a53705272e58.exe windows x86
45c3bbcac4f3f940ff0288fb7ec8e87e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetRect
DdeAccessData
SetMenuItemInfoA
RegisterClassExA
IsWindowEnabled
MenuItemFromPoint
SetCapture
DlgDirSelectExW
GetGUIThreadInfo
FillRect
DestroyWindow
RegisterClassA
ShowCursor
GetClipboardOwner
GetScrollRange
CreateDesktopW
DefDlgProcW
GetMenuItemCount
ToUnicode
DefWindowProcW
GetMessageTime
TileChildWindows
ShowWindow
ModifyMenuW
DlgDirListW
GetComboBoxInfo
CreateWindowExW
MessageBoxW
TileWindows
shell32
SHGetPathFromIDList
ExtractIconExW
comctl32
ImageList_SetOverlayImage
InitCommonControlsEx
wininet
UpdateUrlCacheContentPath
FtpGetFileA
ShowSecurityInfo
InternetFortezzaCommand
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
kernel32
CreateFileW
OpenSemaphoreW
SetHandleCount
DosDateTimeToFileTime
FreeEnvironmentStringsW
TlsSetValue
InterlockedExchange
WritePrivateProfileStructW
QueryPerformanceCounter
VirtualFree
GetShortPathNameA
UnmapViewOfFile
IsBadWritePtr
GetModuleFileNameW
VirtualQuery
InterlockedIncrement
GetModuleHandleA
LoadLibraryW
IsValidCodePage
LoadLibraryA
FindAtomW
LCMapStringA
GetLocalTime
SetLastError
OpenMutexA
ReadConsoleOutputCharacterA
WriteFile
GetEnvironmentStringsW
GetDiskFreeSpaceW
CreateWaitableTimerW
GetStartupInfoW
GetTickCount
GetPrivateProfileIntA
SetStdHandle
InitializeCriticalSection
GetUserDefaultLCID
HeapFree
CompareStringA
ExitProcess
CompareStringW
MultiByteToWideChar
FindResourceA
SetEnvironmentVariableA
WritePrivateProfileSectionA
GetVersion
TerminateProcess
TlsAlloc
GetEnvironmentStrings
CreateProcessW
SetLocaleInfoA
DeleteCriticalSection
GetStartupInfoA
GetTimeZoneInformation
WideCharToMultiByte
GetCommandLineW
FlushFileBuffers
GetProcAddress
VirtualAlloc
HeapDestroy
FillConsoleOutputCharacterA
HeapReAlloc
WriteConsoleOutputW
DeleteFiber
GetCurrentProcess
GetFileType
GetLastError
GetProcAddress
ReadFile
RemoveDirectoryA
GetModuleFileNameA
CreateMutexA
FormatMessageW
EnterCriticalSection
SetFilePointer
GetCurrentProcessId
CreateProcessA
HeapCreate
GetCurrentThreadId
GetStringTypeA
GetCPInfo
SetConsoleWindowInfo
GetStdHandle
CloseHandle
FreeEnvironmentStringsA
TlsGetValue
GetCurrentThread
UnhandledExceptionFilter
LCMapStringW
GetVersionExA
GetCommandLineA
TlsFree
lstrcat
HeapValidate
HeapAlloc
RtlUnwind
GetSystemTimeAsFileTime
FileTimeToLocalFileTime
InterlockedDecrement
GetSystemTime
GetStringTypeW
LeaveCriticalSection
advapi32
RegRestoreKeyA
LookupSecurityDescriptorPartsA
RegReplaceKeyW
CryptSetProviderA
InitializeSecurityDescriptor
CryptEnumProvidersA
RegDeleteKeyA
CryptSetProviderExA
StartServiceA
RegEnumValueW
RegSetKeySecurity
gdi32
InvertRgn
GetObjectW
CreateDCA
EnableEUDC
SelectObject
SetBoundsRect
GetDeviceCaps
SelectClipRgn
GetStretchBltMode
DeleteDC
Sections
.text Size: 120KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ