Static task
static1
Behavioral task
behavioral1
Sample
4cd053e4f12e8ddc07f5ed123354dd79d26d7138e22dae312165802f258741ae.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4cd053e4f12e8ddc07f5ed123354dd79d26d7138e22dae312165802f258741ae.exe
Resource
win10v2004-20220812-en
General
-
Target
4cd053e4f12e8ddc07f5ed123354dd79d26d7138e22dae312165802f258741ae
-
Size
149KB
-
MD5
6ea11e2300e6f955738fd8997c27a540
-
SHA1
4b784a4b0d18cc7ee7ea852505cc7cc780f9f265
-
SHA256
4cd053e4f12e8ddc07f5ed123354dd79d26d7138e22dae312165802f258741ae
-
SHA512
a9e625fccd69179ff5bbd420035a637d1a76d8bfa139dbfa4f8dc58ed27a80dc17c6684b8e8ce122624e1d27d374d507c35b13fb50c04a6f52443896b6402a05
-
SSDEEP
3072:nTsCnE5rChD67HuukZ3Qi/TBfULmLlJnFo:QCnE9ChWT7kxQi/TB4mj
Malware Config
Signatures
Files
-
4cd053e4f12e8ddc07f5ed123354dd79d26d7138e22dae312165802f258741ae.exe windows x86
0135880d088fcae074882e2806aedb5e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord4998
ord2514
ord6052
ord5265
ord1775
ord5280
ord4425
ord3597
ord641
ord324
ord4234
ord1168
ord2864
ord6215
ord4287
ord4710
ord4853
ord4376
ord6199
ord535
ord2818
ord4204
ord4278
ord4277
ord5683
ord858
ord4129
ord6662
ord537
ord5572
ord2915
ord3402
ord2135
ord3005
ord2642
ord1768
ord6197
ord1175
ord3619
ord6394
ord2841
ord2107
ord5440
ord6383
ord4673
ord5450
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord3738
ord815
ord561
ord665
ord2086
ord1979
ord3318
ord5186
ord354
ord2621
ord1134
ord6380
ord4274
ord939
ord6880
ord6453
ord1949
ord4034
ord2393
ord654
ord5858
ord341
ord3258
ord1265
ord2233
ord1799
ord2727
ord6467
ord2730
ord2729
ord3353
ord772
ord610
ord801
ord614
ord500
ord287
ord541
ord290
ord4003
ord538
ord5603
ord640
ord5602
ord5608
ord5860
ord6883
ord5857
ord5861
ord6140
ord6142
ord6139
ord6143
ord3981
ord3986
ord6781
ord3979
ord4226
ord446
ord743
ord3127
ord3616
ord5651
ord3126
ord3613
ord350
ord3579
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5290
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1776
ord4078
ord6055
ord3706
ord823
ord825
ord3663
ord3626
ord3571
ord2859
ord323
ord1640
ord2414
ord1641
ord5785
ord2405
ord6605
ord1233
ord4299
ord860
ord472
ord6442
ord2379
ord4133
ord5788
ord4297
ord3573
ord5875
ord3693
ord4275
ord470
ord755
ord818
ord567
ord540
ord4424
ord800
ord3742
ord3079
ord4627
ord4080
ord3830
ord3825
ord3831
ord2985
ord2976
ord3081
ord4465
ord3262
ord3136
ord2982
ord3259
ord3147
ord2446
ord5277
ord2124
ord5261
ord5606
ord1576
msvcrt
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
ftell
strlen
memcpy
_purecall
__CxxFrameHandler
malloc
memset
fread
fopen
_setmbcp
_mbscmp
strcpy
_mbsrchr
sprintf
strcat
strftime
localtime
time
memcmp
_CxxThrowException
_except_handler3
_ftol
_mbslwr
memmove
__dllonexit
_onexit
fclose
fseek
?terminate@@YAXXZ
_controlfp
free
kernel32
SetFilePointer
SetErrorMode
SetUnhandledExceptionFilter
WritePrivateProfileStringA
TerminateThread
CreateThread
CloseHandle
GetVersionExA
lstrlenA
GetModuleHandleA
GetCurrentProcess
GetModuleFileNameA
GetProcAddress
CreateDirectoryA
DeleteFileA
HeapAlloc
HeapReAlloc
Sleep
GetProcessHeap
HeapFree
GetLastError
ReadFile
VirtualQueryEx
GetThreadSelectorEntry
VirtualQuery
GetCurrentThread
ReadProcessMemory
GetTempFileNameA
GetTempPathA
MultiByteToWideChar
lstrlenW
GetStartupInfoA
WideCharToMultiByte
CreateFileA
WriteFile
user32
GetWindowRgn
SetWindowLongA
GetParent
GetForegroundWindow
IsIconic
GetDesktopWindow
LoadMenuA
GetSubMenu
SetForegroundWindow
TrackPopupMenu
DestroyMenu
GetWindowLongA
GetCursorPos
ScreenToClient
PostMessageA
EnableWindow
KillTimer
SystemParametersInfoA
IsWindowVisible
InvalidateRect
SetTimer
LoadCursorA
SetWindowPos
OffsetRect
EqualRect
FillRect
ReleaseCapture
SetRect
SendMessageA
SetWindowRgn
GetDC
IsWindow
GetWindowRect
SetCapture
ReleaseDC
GetActiveWindow
FindWindowA
CallWindowProcA
MessageBeep
gdi32
GetDIBits
GetObjectA
GetRgnBox
ExtCreateRegion
CreatePolygonRgn
DeleteObject
CreateRectRgn
CombineRgn
CreateSolidBrush
CreateRoundRectRgn
FrameRgn
PtInRegion
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
OffsetRgn
GetStockObject
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteA
comctl32
_TrackMouseEvent
ole32
CoCreateGuid
StgOpenStorage
StgCreateDocfile
CoTaskMemFree
CoTaskMemAlloc
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
imagehlp
StackWalk
SymFunctionTableAccess
SymInitialize
SymSetOptions
SymLoadModule
SymGetModuleInfo
SymGetSymFromAddr
Sections
.text Size: 84KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hhqg Size: 9KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE