Static task
static1
Behavioral task
behavioral1
Sample
54450bc1e2d942fd39910570157aec28e48394e8fdfb892edeea4e16a5e16c8c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
54450bc1e2d942fd39910570157aec28e48394e8fdfb892edeea4e16a5e16c8c.exe
Resource
win10v2004-20220812-en
General
-
Target
54450bc1e2d942fd39910570157aec28e48394e8fdfb892edeea4e16a5e16c8c
-
Size
168KB
-
MD5
6dc379e2c6f0cd7ee380bc43e0d8715c
-
SHA1
bfcd1ade829e716936b27c8b88ff9a79ff7b3d20
-
SHA256
54450bc1e2d942fd39910570157aec28e48394e8fdfb892edeea4e16a5e16c8c
-
SHA512
7d11fff5add8677960159a074e30ee4d9851bea2f7a46b7a06ba377a3ef6b2dcfd4b13cac82621c86e6a6340f10a0fbe34f09dab2d536bb2bebd676a5dd84559
-
SSDEEP
3072:9+tgPXSpq5wBRxbnXgeFB8yL6QOIIEK5ZO8reLvMF:Z+q2BRNHX8yeQOIIV5BreLo
Malware Config
Signatures
Files
-
54450bc1e2d942fd39910570157aec28e48394e8fdfb892edeea4e16a5e16c8c.exe windows x86
575a74be2d74ceedecca1e15889917ab
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
SysReAllocStringLen
SafeArrayGetUBound
SafeArrayGetElement
GetErrorInfo
VariantChangeType
SafeArrayPtrOfIndex
advapi32
RegEnumKeyExA
gdi32
CreateBitmap
SetBkColor
GetPaletteEntries
CreateFontIndirectA
CreateCompatibleDC
GetClipBox
BitBlt
GetPixel
SaveDC
shell32
DragQueryFileA
SHGetDiskFreeSpaceA
kernel32
lstrlenA
LoadLibraryExA
ReadFile
LoadLibraryA
GetLastError
MoveFileExA
GetModuleHandleA
GetDiskFreeSpaceA
ExitThread
SetThreadLocale
VirtualAlloc
GlobalAddAtomA
GetProcAddress
comctl32
ImageList_Create
ImageList_Write
ImageList_Add
ImageList_GetBkColor
ImageList_DrawEx
ImageList_Remove
ImageList_Destroy
ImageList_Read
ImageList_Draw
version
GetFileVersionInfoA
VerQueryValueA
msvcrt
log10
calloc
memcmp
memmove
user32
CharNextA
GetDC
GetScrollPos
DefMDIChildProcA
DispatchMessageW
DrawFrameControl
GetMenuStringA
TranslateMessage
GetMessagePos
LoadCursorA
DeleteMenu
SetWindowLongA
ShowScrollBar
EnumThreadWindows
EqualRect
CharLowerBuffA
MessageBoxA
WindowFromPoint
EnumChildWindows
FrameRect
MessageBeep
InvalidateRect
SetRect
IsWindowVisible
CreateWindowExA
GetSubMenu
GetSystemMetrics
OffsetRect
ReleaseCapture
PeekMessageW
SetWindowsHookExA
SetScrollPos
GetScrollRange
DestroyMenu
GetWindowThreadProcessId
ActivateKeyboardLayout
IsWindowUnicode
RedrawWindow
CreateMenu
IsDialogMessageW
GetClassNameA
GetPropA
GetDesktopWindow
PostMessageA
GetIconInfo
SetWindowTextA
IsWindowEnabled
RegisterClassA
GetDCEx
SetPropA
GetWindow
InsertMenuA
GetActiveWindow
ClientToScreen
CharToOemA
RemovePropA
ScrollWindow
GetWindowDC
EndPaint
GetWindowLongW
GetMenuState
SetClassLongA
KillTimer
SetFocus
EnableWindow
SetScrollRange
GetKeyboardLayoutList
GetForegroundWindow
SetScrollInfo
GetScrollInfo
GetCapture
GetWindowRect
SetTimer
DefFrameProcA
TranslateMDISysAccel
GetKeyboardType
DrawMenuBar
GetSystemMenu
DestroyIcon
UnregisterClassA
AdjustWindowRectEx
RemoveMenu
MsgWaitForMultipleObjects
DrawAnimatedRects
SetMenu
PeekMessageA
GetCursor
WaitMessage
MapVirtualKeyA
CharLowerA
ScreenToClient
CreateIcon
GetClipboardData
LoadBitmapA
EnableScrollBar
GetTopWindow
EnumWindows
GetSysColor
GetMenuItemCount
FillRect
GetWindowLongA
OpenClipboard
DispatchMessageA
PostQuitMessage
GetMenuItemID
IsZoomed
GetKeyboardLayoutNameA
SetActiveWindow
DrawTextA
GetParent
CallNextHookEx
GetKeyNameTextA
IsWindow
SetParent
shlwapi
SHDeleteKeyA
SHDeleteValueA
SHQueryInfoKeyA
SHStrDupA
PathGetCharTypeA
SHQueryValueExA
PathIsContentTypeA
ole32
CoCreateFreeThreadedMarshaler
CoGetContextToken
CoFreeUnusedLibraries
CoGetMalloc
comdlg32
GetFileTitleA
ChooseColorA
Sections
.text Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 512B - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 815B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ