Static task
static1
Behavioral task
behavioral1
Sample
48cf1ab2a50ba0762887e8e82cf2e2c88e8d7fe1ff9e3d8e0658c72cc32d6be3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
48cf1ab2a50ba0762887e8e82cf2e2c88e8d7fe1ff9e3d8e0658c72cc32d6be3.exe
Resource
win10v2004-20220812-en
General
-
Target
48cf1ab2a50ba0762887e8e82cf2e2c88e8d7fe1ff9e3d8e0658c72cc32d6be3
-
Size
216KB
-
MD5
695ca35d2bed83aee80b5b4a6ceee120
-
SHA1
1cf1b3c19594d0f7e9ac6ac419365b339463bb76
-
SHA256
48cf1ab2a50ba0762887e8e82cf2e2c88e8d7fe1ff9e3d8e0658c72cc32d6be3
-
SHA512
759dc899e0bb8fe82d6c0ce5a41bc23e1513a76b0fcd9636b0a29cd81b22109a602ffd66198643429d8531249c184d793b8b3ff36200452dcb72cfb46359c1e4
-
SSDEEP
1536:zHToMGH+tehULEqpx9SN5248mETiV51b7BphCZupM1bGM8bxNh8:zse4iL/E5xAmVPboRixNh8
Malware Config
Signatures
Files
-
48cf1ab2a50ba0762887e8e82cf2e2c88e8d7fe1ff9e3d8e0658c72cc32d6be3.exe windows x86
10e02eb53aa6933ce5c0158065911ae6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CloseDesktop
CreateDialogParamA
IsZoomed
MessageBoxA
CharPrevW
IsChild
UnregisterClassA
SendIMEMessageExA
SetProcessWindowStation
RegisterClassExW
FindWindowExW
MonitorFromWindow
LoadStringW
CallNextHookEx
CreateWindowExA
FindWindowA
SetWindowsHookW
ModifyMenuA
CharPrevW
SetWindowTextA
CopyRect
SendMessageCallbackW
MessageBoxIndirectW
FindWindowExA
FindWindowA
GetLastActivePopup
SystemParametersInfoA
GetTitleBarInfo
DragDetect
DeleteMenu
FindWindowExW
SetWindowsHookW
IsCharAlphaW
FindWindowA
SetWindowsHookExW
WINNLSEnableIME
IsZoomed
GetDlgItemInt
WINNLSGetEnableStatus
IsZoomed
CreateDialogParamA
InsertMenuItemW
PostThreadMessageA
PostQuitMessage
VkKeyScanA
GetWindowRgn
DispatchMessageA
FindWindowA
IsZoomed
FindWindowExA
GetMenuInfo
ScrollDC
GetWindowRgn
DefFrameProcA
CreateIcon
SetClassLongW
CallNextHookEx
MonitorFromPoint
MessageBoxIndirectA
SetWindowTextA
UpdateWindow
DrawCaption
kernel32
GetSystemDirectoryA
LocalFlags
GetLongPathNameW
EnumTimeFormatsW
Thread32Next
QueryDosDeviceW
GetPrivateProfileSectionA
GetCommMask
SetConsoleWindowInfo
WritePrivateProfileSectionA
HeapCompact
SetThreadExecutionState
GetProcessShutdownParameters
PeekConsoleInputW
GetWindowsDirectoryW
SetThreadExecutionState
ClearCommBreak
GetThreadTimes
FindCloseChangeNotification
GetCommTimeouts
LocalFlags
EscapeCommFunction
GetStringTypeExA
_lread
SetNamedPipeHandleState
SetNamedPipeHandleState
GetThreadTimes
SetLocaleInfoW
MoveFileExW
WriteFile
WriteProfileSectionW
WritePrivateProfileSectionA
GlobalGetAtomNameA
CreateHardLinkA
SetLocaleInfoW
LocalFlags
SetLocaleInfoA
GetStartupInfoW
GetThreadSelectorEntry
SetEndOfFile
CreateHardLinkW
ClearCommBreak
WritePrivateProfileStructA
ClearCommBreak
GetBinaryTypeA
GetCommTimeouts
WritePrivateProfileSectionA
CreateThread
MulDiv
GetThreadPriority
Process32First
SwitchToFiber
MapViewOfFileEx
GetCurrentProcessId
GetPrivateProfileSectionA
Process32First
GlobalGetAtomNameA
WaitCommEvent
CreateIoCompletionPort
GetProcessHeaps
gdi32
CreateICW
GetMetaRgn
SelectObject
GetTextCharacterExtra
GetCurrentObject
GdiPlayScript
DeviceCapabilitiesExW
GetDCBrushColor
GdiGetPageHandle
GetCurrentObject
GdiPlayEMF
GetEnhMetaFileBits
SelectObject
Rectangle
ExtSelectClipRgn
ExtTextOutW
Ellipse
PtVisible
CopyEnhMetaFileA
SelectObject
SetTextColor
SetMapperFlags
DeleteObject
SetStretchBltMode
SetPixelFormat
GetObjectType
CreateFontW
GetTextColor
SelectBrushLocal
SetColorSpace
GetTextExtentPointA
GetCurrentObject
GetCurrentObject
CreateDiscardableBitmap
GetBkColor
GetMapMode
PathToRegion
GetFontAssocStatus
Ellipse
GetCurrentObject
GetICMProfileW
Ellipse
Ellipse
CombineTransform
SetColorAdjustment
ExtCreateRegion
GetRgnBox
UpdateICMRegKeyW
CreateRoundRectRgn
GdiPlayEMF
GdiPlayPrivatePageEMF
GetTextColor
OffsetViewportOrgEx
EnumObjects
DrawEscape
SetMapMode
GdiGetSpoolFileHandle
SetBkColor
SetMetaFileBitsEx
CloseEnhMetaFile
CopyMetaFileW
GetGlyphIndicesW
GetBkColor
PtVisible
CreateCompatibleBitmap
SetBkColor
EnumEnhMetaFile
Sections
.text Size: 203KB - Virtual size: 236KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 512B - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 512B - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE