Static task
static1
Behavioral task
behavioral1
Sample
19389ffe7c1b326b21c9c10bdc7908e520c94e806e51c7dbb57d82b5b9b0049e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
19389ffe7c1b326b21c9c10bdc7908e520c94e806e51c7dbb57d82b5b9b0049e.exe
Resource
win10v2004-20220812-en
General
-
Target
19389ffe7c1b326b21c9c10bdc7908e520c94e806e51c7dbb57d82b5b9b0049e
-
Size
236KB
-
MD5
46487a2382600756ff0aa1317aac3100
-
SHA1
0f1ae8170ee7c2a65d70f49a905675f227a60dc9
-
SHA256
19389ffe7c1b326b21c9c10bdc7908e520c94e806e51c7dbb57d82b5b9b0049e
-
SHA512
03d3087bf6fc254320f4b734d49eeb71b8264a6f0c87a8bee91d39b33e2399eb617d237d6b662c311c95c2b38ea3bb6633a0659b54b36da3d82f82ba9f61a208
-
SSDEEP
6144:5JL59SwD1d6wpIWKMyGHu+eKgOJpYvoTmi:5H9z2wumjRLgoTmi
Malware Config
Signatures
Files
-
19389ffe7c1b326b21c9c10bdc7908e520c94e806e51c7dbb57d82b5b9b0049e.exe windows x86
a140398bc2768cb8d4196cd5888d604c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetWindowPos
CloseClipboard
IsDlgButtonChecked
SetMenuItemInfoW
IsWindowVisible
EnumChildWindows
MessageBoxA
DrawStateW
IsDialogMessageW
GetWindow
GetSysColorBrush
GetMenuItemID
GetClientRect
SetFocus
SetMenu
PtInRect
GetSystemMetrics
DeferWindowPos
DrawIcon
SetActiveWindow
SetWindowLongW
PostMessageW
GetWindowTextLengthW
PeekMessageW
GetSysColor
GetMessagePos
SetTimer
InvalidateRect
BeginDeferWindowPos
DrawFocusRect
GetMenu
FrameRect
UnregisterClassA
GetDlgItemTextW
IntersectRect
GetDC
EndDialog
TranslateMessage
CallNextHookEx
TrackPopupMenuEx
GetSubMenu
GetParent
DefWindowProcW
GetCapture
GetMenuState
GetWindowTextW
MessageBoxW
AppendMenuW
CopyRect
EndDeferWindowPos
IsWindow
GetWindowLongW
GetDlgItem
ReleaseCapture
GetActiveWindow
FindWindowW
CreateWindowExW
DeleteMenu
PostQuitMessage
GetKeyState
ShowWindow
SystemParametersInfoA
MapWindowPoints
IsChild
GetWindowRect
GetScrollInfo
SetCapture
ScreenToClient
GetForegroundWindow
DrawTextW
RegisterClassW
DestroyWindow
RegisterClassExW
advapi32
RegEnumKeyW
GetTokenInformation
RegQueryValueExW
RegSetValueExW
RegQueryValueExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
shell32
ord155
ShellExecuteA
SHBrowseForFolderA
comctl32
ord17
ImageList_SetImageCount
ImageList_Create
ImageList_GetImageCount
ImageList_GetIcon
ImageList_AddMasked
InitCommonControlsEx
ImageList_LoadImageW
ImageList_Destroy
_TrackMouseEvent
ImageList_Draw
oleaut32
LoadTypeLi
kernel32
GetLocalTime
GetCPInfo
FatalAppExitA
GetStringTypeW
GetProcAddress
SetHandleCount
FlushFileBuffers
GetModuleFileNameA
HeapCreate
InterlockedExchange
TlsAlloc
GetTimeZoneInformation
HeapDestroy
GetVersion
FreeEnvironmentStringsA
GetSystemTimeAsFileTime
SetConsoleCtrlHandler
TerminateProcess
LCMapStringW
GetCommandLineW
TlsGetValue
LoadLibraryA
WideCharToMultiByte
CreateMutexW
SetStdHandle
CloseHandle
HeapFree
InterlockedDecrement
CompareStringA
IsBadCodePtr
GetLastError
GetModuleHandleA
GetModuleFileNameW
ExitProcess
GetStdHandle
GetEnvironmentStrings
MultiByteToWideChar
InitializeCriticalSection
SetFilePointer
WriteFile
FreeEnvironmentStringsW
LeaveCriticalSection
OpenMutexW
RaiseException
DeleteCriticalSection
HeapAlloc
GetStartupInfoW
CompareStringW
LCMapStringA
VirtualAlloc
TlsFree
UnhandledExceptionFilter
GetEnvironmentStringsW
SetLastError
SetUnhandledExceptionFilter
EnterCriticalSection
TlsSetValue
QueryPerformanceCounter
HeapReAlloc
GetTickCount
GetCommandLineA
GetSystemTime
GetCurrentProcessId
VirtualQuery
GetCurrentProcess
GetStringTypeA
SetEnvironmentVariableA
RtlUnwind
IsBadWritePtr
GetStartupInfoA
VirtualFree
GetCurrentThreadId
GetCurrentThread
GetFileType
GetModuleHandleW
ReadFile
IsBadReadPtr
InterlockedIncrement
Sections
.text Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ