Static task
static1
Behavioral task
behavioral1
Sample
51d3b7a94cc491d9f67a41a0aa8ded69b6695bdbb3681a182ddf17e7a694a413.exe
Resource
win7-20220901-en
General
-
Target
51d3b7a94cc491d9f67a41a0aa8ded69b6695bdbb3681a182ddf17e7a694a413
-
Size
212KB
-
MD5
6af9ffbe4f9c1b77af78ac9a17a20eec
-
SHA1
a3da5f8f625a9d57e318ab22ae726933a2fecf8d
-
SHA256
51d3b7a94cc491d9f67a41a0aa8ded69b6695bdbb3681a182ddf17e7a694a413
-
SHA512
a15891f0ccf98738b764d9c27c93c524c72308150050e3be1f1388ebb00574dee285ab1564b45ac061051fcbabd85305558fbb3c2970f5eed035b2b189c2b3ad
-
SSDEEP
6144:mzcmb20RUOesjzYXLfXsYqCb0go6NPcz7:mzxveAzkvSCb0aNPcz7
Malware Config
Signatures
Files
-
51d3b7a94cc491d9f67a41a0aa8ded69b6695bdbb3681a182ddf17e7a694a413.exe windows x86
9e5f1c80b982b6227bb5268b8c793571
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
kernel32
RaiseException
DeleteCriticalSection
InitializeCriticalSection
GetProcessHeap
HeapFree
lstrlenA
FindClose
CreateDirectoryA
RemoveDirectoryA
FormatMessageA
FindFirstFileA
ReadFile
GetSystemDirectoryA
GetWindowsDirectoryA
GetTempPathA
GetEnvironmentVariableA
GetLogicalDriveStringsA
GetDriveTypeA
GetStringTypeExA
GetTempFileNameA
FindNextFileA
CreateProcessA
GetExitCodeProcess
GetVersion
lstrcmpA
GetDiskFreeSpaceA
GetModuleHandleA
MulDiv
GetCurrentThreadId
GetCurrentProcess
FlushInstructionCache
LeaveCriticalSection
EnterCriticalSection
GetModuleFileNameA
OutputDebugStringA
LoadLibraryExA
GetSystemDefaultLangID
GetUserDefaultLangID
EnumResourceLanguagesA
FlushFileBuffers
lstrcmpiA
GlobalMemoryStatus
GlobalAlloc
GlobalLock
GlobalUnlock
InterlockedIncrement
InterlockedDecrement
IsDBCSLeadByte
lstrcpynA
MultiByteToWideChar
lstrlenW
CreateMutexA
GetFileAttributesA
SetFileAttributesA
CopyFileA
DebugBreak
HeapSize
HeapReAlloc
HeapDestroy
LocalAlloc
GetStartupInfoA
GetCommandLineA
GetProcAddress
ExitProcess
LoadLibraryA
Sleep
ResetEvent
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
lstrcatA
lstrcpyA
VirtualProtect
WriteFile
MoveFileA
DeleteFileA
GetFileSize
SetFilePointer
CreateFileA
FindResourceExA
LoadResource
LockResource
SizeofResource
FindResourceA
WideCharToMultiByte
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
CreateEventA
SetEvent
GetExitCodeThread
WaitForSingleObject
GetLastError
CreateThread
CloseHandle
FreeLibrary
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapAlloc
RtlUnwind
user32
GetSubMenu
LoadMenuA
TrackPopupMenu
EnableMenuItem
IsDialogMessageA
ExitWindowsEx
GetDC
SetFocus
DefWindowProcA
CallWindowProcA
GetSystemMetrics
LoadImageA
DestroyMenu
GetSystemMenu
DialogBoxParamA
CloseClipboard
InvalidateRect
RedrawWindow
ShowWindow
CreateWindowExA
DestroyWindow
RemovePropA
SetPropA
IsWindow
PostMessageA
MessageBoxA
KillTimer
EnableWindow
SetTimer
GetPropA
PostQuitMessage
CreateDialogParamA
SetClipboardData
ModifyMenuA
EmptyClipboard
GetActiveWindow
LoadStringA
SetWindowLongA
SendMessageA
EndDialog
GetWindowLongA
GetWindow
OpenClipboard
LoadIconA
ScreenToClient
SystemParametersInfoA
GetWindowRect
GetParent
MapWindowPoints
SetWindowPos
SetWindowTextA
GetDlgItem
UnregisterClassA
CharNextA
GetDesktopWindow
IsWindowVisible
wvsprintfA
GetClientRect
gdi32
GetDeviceCaps
advapi32
RegCloseKey
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
RegDeleteValueA
RegOpenKeyA
RegQueryInfoKeyA
RegEnumKeyExA
OpenSCManagerA
LockServiceDatabase
UnlockServiceDatabase
CloseServiceHandle
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegDeleteKeyA
shell32
ShellExecuteA
ShellExecuteExA
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHBrowseForFolderA
ole32
CoUninitialize
CoInitialize
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
CoTaskMemFree
oleaut32
VarUI4FromStr
comctl32
DestroyPropertySheetPage
PropertySheetA
CreatePropertySheetPageA
Sections
.text Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.0rdata Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE