Static task
static1
Behavioral task
behavioral1
Sample
f1e9402e278c4b35b530016042f8835af91b8f19ddf1c726584c825a6daf8765.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f1e9402e278c4b35b530016042f8835af91b8f19ddf1c726584c825a6daf8765.exe
Resource
win10v2004-20220812-en
General
-
Target
f1e9402e278c4b35b530016042f8835af91b8f19ddf1c726584c825a6daf8765
-
Size
36KB
-
MD5
53c0514faa71f638c0c9ebfe066034a0
-
SHA1
57e4f2b87a329ddd442f712c8104bb2a87a3b94d
-
SHA256
f1e9402e278c4b35b530016042f8835af91b8f19ddf1c726584c825a6daf8765
-
SHA512
85ee7d2305bd300f7fe459c43aa2de2c638ca2e6f8630d5c98496f18f176f009d13488f9d5ef02bc350673989408b5635f599452ac7e86f453e9561074e84678
-
SSDEEP
768:eiHyJGY/GL1uXdMFqOOjEafEeIArP8CUEOu3RWeAMWtQ:eHGYeshPmg
Malware Config
Signatures
Files
-
f1e9402e278c4b35b530016042f8835af91b8f19ddf1c726584c825a6daf8765.exe windows x86
9a689ba2b0049391d0dafeae5f8ff9c2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
PlaySoundW
sndPlaySoundA
sndPlaySoundW
waveOutOpen
PlaySoundA
ntdll
ZwQuerySystemInformation
ZwResumeThread
ZwOpenProcess
memset
RtlUnwind
ZwQueueApcThread
ZwMapViewOfSection
NtQueryVirtualMemory
shlwapi
StrToIntW
StrStrIW
PathCombineW
dbghelp
MiniDumpWriteDump
kernel32
CreateProcessW
SetUnhandledExceptionFilter
SetEvent
GetModuleHandleW
Beep
ExitThread
GetProcAddress
Process32FirstW
GetModuleFileNameA
Process32NextW
CreateToolhelp32Snapshot
OpenEventW
GetCurrentProcessId
GetLastError
DeleteFileA
Sleep
SetFileAttributesA
GetComputerNameA
GetCommandLineW
GetCurrentProcess
WaitForSingleObject
GetModuleFileNameW
CreateFileW
OpenMutexW
GetLocalTime
GetCurrentThreadId
ReleaseMutex
MapViewOfFile
UnmapViewOfFile
GetTickCount
GetSystemDirectoryW
TerminateThread
CreateFileMappingW
CreateEventW
lstrcatW
lstrlenA
GlobalAlloc
GlobalFree
CloseHandle
CreateThread
lstrcpyA
CreateMutexW
HeapAlloc
VirtualFree
GetProcessHeap
CreateRemoteThread
OpenProcess
VirtualFreeEx
SetLastError
VirtualAlloc
VirtualAllocEx
OpenThread
GetExitCodeThread
Module32FirstW
VirtualProtect
Module32NextW
WriteProcessMemory
SwitchToThread
HeapCompact
HeapFree
SleepEx
HeapCreate
GetProcessHeaps
QueueUserAPC
GetHandleInformation
InitializeCriticalSection
LeaveCriticalSection
IsBadWritePtr
EnterCriticalSection
WideCharToMultiByte
GetVersionExW
lstrlenW
lstrcmpiW
lstrcpyW
SetPriorityClass
SetErrorMode
OpenFileMappingW
lstrcmpiA
SetThreadPriority
ResumeThread
GlobalMemoryStatus
GetSystemInfo
GlobalLock
ExitProcess
GlobalUnlock
MultiByteToWideChar
user32
SwitchDesktop
DefMDIChildProcW
ShowWindow
GetCursorPos
DefWindowProcA
EmptyClipboard
PeekMessageA
PeekMessageW
GetClipboardData
SetCursorPos
FlashWindowEx
TrackPopupMenuEx
GetCapture
wsprintfW
OpenDesktopW
OpenInputDesktop
DefFrameProcA
MessageBeep
IsClipboardFormatAvailable
DefDlgProcW
SetCapture
GetPriorityClipboardFormat
GetMessageW
OpenDesktopA
CloseClipboard
GetMessageA
GetWindowThreadProcessId
CharUpperA
GetUserObjectInformationW
GetWindow
SendMessageW
PrintWindow
IsWindowVisible
FindWindowExW
SetLayeredWindowAttributes
EnumChildWindows
GetDesktopWindow
RedrawWindow
SetWindowLongW
SetClassLongW
EnumWindows
GetClassLongW
SetThreadDesktop
GetParent
GetThreadDesktop
ScreenToClient
GetUserObjectInformationA
ActivateKeyboardLayout
EndMenu
HiliteMenuItem
IsWindow
GetMenuItemCount
WindowFromDC
GetMenuState
GetAncestor
GetMenuItemRect
GetMenu
GetClientRect
FindWindowW
MenuItemFromPoint
GetSubMenu
PostMessageW
SetKeyboardState
GetMenuItemID
FillRect
TrackPopupMenu
GetSystemMenu
ClientToScreen
SetWindowPos
GetWindowLongW
BringWindowToTop
SetFocus
AttachThreadInput
SetForegroundWindow
IsIconic
GetClassNameA
ReleaseDC
GetDC
SetClipboardData
FlashWindow
GetCaretBlinkTime
CallWindowProcW
DefWindowProcW
GetMessagePos
DefFrameProcW
DefDlgProcA
OpenClipboard
DefMDIChildProcA
ReleaseCapture
GetWindowInfo
CountClipboardFormats
CallWindowProcA
gdi32
CreateCompatibleBitmap
CreateSolidBrush
SetDIBitsToDevice
CreateCompatibleDC
DeleteDC
CreateDIBSection
GetDIBits
SetViewportOrgEx
GdiFlush
GetClipRgn
GetViewportOrgEx
DeleteObject
SelectClipRgn
CreateRectRgn
BitBlt
SelectObject
advapi32
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
GetTokenInformation
OpenProcessToken
shell32
CommandLineToArgvW
SHGetFolderPathW
ShellExecuteW
uxtheme
GetThemeAppProperties
SetThemeAppProperties
Sections
.text Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ