Static task
static1
Behavioral task
behavioral1
Sample
4da12ecfe12405cf0c8e0731cae6150f01c7325b247c7095714edb0b197a0046.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4da12ecfe12405cf0c8e0731cae6150f01c7325b247c7095714edb0b197a0046.exe
Resource
win10v2004-20220812-en
General
-
Target
4da12ecfe12405cf0c8e0731cae6150f01c7325b247c7095714edb0b197a0046
-
Size
172KB
-
MD5
602b128f4b2bf2f51be200e506355d3d
-
SHA1
6e52e21e5967eeb7935707d6df3f02dbc33df68a
-
SHA256
4da12ecfe12405cf0c8e0731cae6150f01c7325b247c7095714edb0b197a0046
-
SHA512
f42cbb98de4dba8b29a96fecfe9bdf299a616ee9c3d79b0f8dabb4b518b4b263129158d5fc786b416fa4ba7593b7c07a9e543489570b62236fe6717a9df5c607
-
SSDEEP
3072:25jlXRFSICa6HcA15RWm2JL7l0f4GDH9MVQu69f8w/D2X4hrOta24M2g40o:Oj1RFSI25MmoLh0grK/DQQ/wo
Malware Config
Signatures
Files
-
4da12ecfe12405cf0c8e0731cae6150f01c7325b247c7095714edb0b197a0046.exe windows x86
e3744ebb99a88d453ddaeed7890c0ccc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
HeapSize
ReadFile
SetEndOfFile
VirtualQuery
InterlockedExchange
RtlUnwind
GetCPInfo
GetACP
IsBadWritePtr
HeapReAlloc
VirtualAlloc
FlushFileBuffers
CreateFileA
VirtualFree
HeapCreate
GetLocaleInfoA
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetModuleFileNameA
GetStdHandle
WriteFile
CloseHandle
HeapFree
SetFilePointer
GetLastError
GetCurrentProcess
TerminateProcess
ExitProcess
LoadLibraryA
GetProcAddress
VirtualAllocEx
lstrcpynW
GetSystemInfo
GlobalSize
SetStdHandle
InitializeCriticalSection
GetConsoleCP
GetCommandLineW
HeapAlloc
FindFirstFileW
lstrcatW
GetVersionExA
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
FindClose
LeaveCriticalSection
FindNextFileW
SetUnhandledExceptionFilter
GetOEMCP
GetCurrentThreadId
EnumSystemLocalesA
WaitForMultipleObjects
GetTickCount
GetTimeFormatW
TlsSetValue
ResumeThread
GetStringTypeW
HeapDestroy
VirtualProtect
user32
SendMessageW
DrawMenuBar
DestroyWindow
SetScrollRange
SetWindowsHookExW
GetWindowLongW
GetCursorPos
RedrawWindow
DeferWindowPos
DestroyAcceleratorTable
MessageBeep
MessageBoxW
DrawFocusRect
GetMenuItemCount
SetMenu
SetWindowLongW
EnableWindow
EndPaint
ScrollWindow
DeleteMenu
DrawTextExW
CharUpperW
SetDlgItemInt
EnableMenuItem
ModifyMenuW
LoadImageW
IsDialogMessageA
IsIconic
DrawFrameControl
GetWindowPlacement
InvalidateRect
SetWindowPlacement
SetParent
GetDC
ReleaseCapture
GetMessageA
DragDetect
SetForegroundWindow
DestroyCaret
GetMenu
IsWindowVisible
gdi32
BitBlt
SaveDC
Rectangle
SelectObject
CreateSolidBrush
AddFontResourceW
GetROP2
SetTextColor
SetTextAlign
SetWindowOrgEx
DeleteObject
RestoreDC
StartDocW
comdlg32
ChooseColorA
GetFileTitleW
FindTextA
GetSaveFileNameA
GetOpenFileNameA
ReplaceTextW
ChooseFontW
PageSetupDlgA
PrintDlgW
ChooseFontA
GetFileTitleA
GetOpenFileNameW
ReplaceTextA
PageSetupDlgW
FindTextW
GetSaveFileNameW
ChooseColorW
PrintDlgA
advapi32
RegOpenKeyExA
RegCreateKeyA
RegEnumKeyExW
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueW
RegQueryInfoKeyA
RegCloseKey
RegOpenKeyExW
RegDeleteKeyW
RegCreateKeyExW
RegQueryInfoKeyW
RegDeleteValueA
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128KB - Virtual size: 380KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ