Static task
static1
Behavioral task
behavioral1
Sample
c954c25a1df988f220f3e65c09f19b09f05a937b0f4be7e087e842b2e551bc1a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c954c25a1df988f220f3e65c09f19b09f05a937b0f4be7e087e842b2e551bc1a.exe
Resource
win10v2004-20220812-en
General
-
Target
c954c25a1df988f220f3e65c09f19b09f05a937b0f4be7e087e842b2e551bc1a
-
Size
404KB
-
MD5
636019526df9da2d5845b82137f838b4
-
SHA1
05cdfd33cce779dfc61d9466b89a67037d670e13
-
SHA256
c954c25a1df988f220f3e65c09f19b09f05a937b0f4be7e087e842b2e551bc1a
-
SHA512
b67a0e92527bd2de660f8563c6f75714fbb5fc0e5dc7593861ffbf3f8d608fe2a9617444ec34ff1e7d3f0c6cfd5ab8c45b5de69483e70073312604717d8a8a00
-
SSDEEP
6144:e7cycJtjE9HOewAGt1L2kIaOr5kA2LNMlZNlUq26C4UDRR93VbsF5BGScU+UxDfx:dxEFOew/t1SHzdkFOZNo1hb7wz
Malware Config
Signatures
Files
-
c954c25a1df988f220f3e65c09f19b09f05a937b0f4be7e087e842b2e551bc1a.exe windows x86
20875df0c061094ec892946947e8c26e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
BitBlt
SetTextColor
CreateSolidBrush
user32
PeekMessageA
GetDC
GetCursorPos
ReleaseDC
SendMessageA
GetActiveWindow
GetKeyState
DestroyWindow
GetMessageA
GetParent
UpdateWindow
ShowWindow
EnableWindow
SetWindowPos
TranslateMessage
LoadStringA
IsIconic
SetTimer
FillRect
EndPaint
SetFocus
IsWindow
KillTimer
DefWindowProcA
GetSystemMetrics
GetWindowRect
ReleaseCapture
SetWindowLongA
SetWindowTextA
CheckMenuItem
DispatchMessageA
CreateWindowExA
GetDlgItem
ScreenToClient
LoadCursorA
LoadIconA
MessageBoxA
GetSysColor
SystemParametersInfoA
IsWindowVisible
InvalidateRect
GetClientRect
SetCursor
PostQuitMessage
BeginPaint
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
kernel32
IsBadWritePtr
FatalAppExitA
RtlUnwind
GetSystemDefaultLCID
GetUserDefaultLangID
GetUserDefaultLCID
GetSystemDefaultLangID
GetStdHandle
GetConsoleOutputCP
ReleaseMutex
FileTimeToSystemTime
GetFileAttributesA
WaitForSingleObject
HeapDestroy
GetFileAttributesW
GetLocalTime
FreeEnvironmentStringsA
DeleteCriticalSection
SetConsoleCtrlHandler
GetCurrentDirectoryA
GetConsoleMode
GetLocaleInfoA
LocalAlloc
FreeEnvironmentStringsW
GetCPInfo
GetStringTypeA
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetOEMCP
LocalFree
GetExitCodeProcess
InitializeCriticalSection
LoadResource
FindClose
TlsGetValue
FormatMessageA
SetLastError
GetEnvironmentVariableA
IsDebuggerPresent
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoW
GetCurrentProcess
CompareStringA
VirtualAlloc
Sleep
VirtualFree
HeapCreate
IsValidCodePage
CreateProcessA
SizeofResource
SetStdHandle
InterlockedExchange
GetModuleHandleW
GetACP
CloseHandle
ReadFile
SetFilePointer
TlsFree
RaiseException
GetCurrentThread
InterlockedCompareExchange
GetCommandLineA
HeapSize
WideCharToMultiByte
GetCommandLineW
LockResource
GetCurrentProcessId
GetEnvironmentStrings
FileTimeToLocalFileTime
lstrlenW
GlobalAlloc
GlobalUnlock
GetEnvironmentStringsW
LCMapStringA
FindResourceW
GetConsoleCP
GlobalFree
lstrlenA
GetSystemInfo
UnmapViewOfFile
LCMapStringW
LoadLibraryExW
GetLastError
LeaveCriticalSection
GetCurrentThreadId
CreateFileA
TlsSetValue
GetFileType
CreateEventA
CreateFileW
GetTimeZoneInformation
GlobalLock
DuplicateHandle
FindFirstFileW
ResetEvent
GetDiskFreeSpaceA
FindFirstFileA
CompareStringW
GetProcessHeap
GetProcAddress
SetEvent
DeleteFileA
GetFileSize
GetStartupInfoA
LoadLibraryA
FlushFileBuffers
TlsAlloc
GetTickCount
QueryPerformanceCounter
FreeLibrary
LoadLibraryW
SetHandleCount
EnterCriticalSection
HeapFree
WriteConsoleW
SetCurrentDirectoryA
InterlockedIncrement
GetVersion
SetEndOfFile
VirtualQuery
WriteConsoleA
TerminateProcess
SetEnvironmentVariableA
GetSystemDirectoryA
MulDiv
SetUnhandledExceptionFilter
CreateThread
HeapAlloc
GetModuleHandleA
CreateMutexA
MultiByteToWideChar
InterlockedDecrement
UnhandledExceptionFilter
GetModuleFileNameA
GetVersionExA
ExitProcess
oleaut32
SysAllocStringLen
SysFreeString
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 288KB - Virtual size: 284KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ