Static task
static1
Behavioral task
behavioral1
Sample
460bc3970a5058e7deeda26e61abcfa7985141f3bc5bc59bdcb07c3e81e152fd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
460bc3970a5058e7deeda26e61abcfa7985141f3bc5bc59bdcb07c3e81e152fd.exe
Resource
win10v2004-20220812-en
General
-
Target
460bc3970a5058e7deeda26e61abcfa7985141f3bc5bc59bdcb07c3e81e152fd
-
Size
253KB
-
MD5
6c11dc68dff9adb491a73768c49fb9ab
-
SHA1
3adc4ac128cd879d73bc38414849e0da76765208
-
SHA256
460bc3970a5058e7deeda26e61abcfa7985141f3bc5bc59bdcb07c3e81e152fd
-
SHA512
5830d0165a8e0ebedd4951a3b94078fe451171c29abe0e3b74ec3c9c7c4f4e5d958641d9518c106e70720065881878d69ee9724d756411869a2de27cd6cfcd2a
-
SSDEEP
6144:3zLUFV59midrlFsXgiaVSkRKkpyKUttxHJ5iLMqPbc3r4P:3sbmitVSkRxpDUtp5CMqbyMP
Malware Config
Signatures
Files
-
460bc3970a5058e7deeda26e61abcfa7985141f3bc5bc59bdcb07c3e81e152fd.exe windows x86
ebd482fe24b7f708c9d6bec9a37ae7a1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCreateKeyW
RegFlushKey
gdi32
SetRectRgn
CreatePen
CreateICW
LineTo
GetStockObject
BitBlt
MoveToEx
SetPixel
CreateCompatibleDC
SelectObject
user32
MessageBeep
ShowCursor
LoadBitmapW
SendMessageW
GetMenu
LoadCursorW
RegisterClassW
LoadIconW
GetDlgItemInt
KillTimer
GetMessageW
InvalidateRect
SetCursor
GetSystemMetrics
TranslateMessage
GetWindowRect
CreateWindowExW
GetSysColor
kernel32
GetUserDefaultLangID
GetFileAttributesA
HeapCreate
lstrcpynW
WriteFile
HeapQueryInformation
WaitForSingleObject
GetLocalTime
GetSystemDefaultLangID
lstrcmpA
GetUserDefaultUILanguage
SetFilePointer
EnumSystemLanguageGroupsA
GetSystemDefaultLCID
GetTickCount
WriteFileEx
RegisterWaitForSingleObject
HeapFree
InitializeCriticalSection
SleepEx
ReadFile
VirtualAllocEx
UnmapViewOfFile
GetFileTime
FileTimeToLocalFileTime
InterlockedPopEntrySList
SetEnvironmentVariableA
IsValidLanguageGroup
CreateIoCompletionPort
DeleteCriticalSection
GetSystemTimes
GetSystemTimeAsFileTime
ConnectNamedPipe
TryEnterCriticalSection
lstrcmpW
EncodePointer
ExitThread
lstrcmpiA
EnterCriticalSection
GetCurrentProcessId
ReadFileEx
HeapCompact
CreateFileA
DisconnectNamedPipe
SetThreadLocale
CallNamedPipeA
HeapSummary
CreateFileMappingA
CloseHandle
CreateMutexA
SetThreadContext
HeapDestroy
ConvertDefaultLocale
IsValidLocale
ResetEvent
CreateThread
HeapAlloc
GetStringTypeA
OpenThread
EnumLanguageGroupLocalesA
RtlZeroMemory
GetUserDefaultLCID
MapViewOfFile
GetFirmwareEnvironmentVariableA
CreateNamedPipeA
InterlockedExchangeAdd
GetThreadSelectorEntry
EnumSystemLocalesA
WaitForSingleObjectEx
DecodePointer
lstrcpynA
GetLocaleInfoA
LeaveCriticalSection
GetThreadPriority
InterlockedPushEntrySList
FileTimeToDosDateTime
msvcrt
__p__commode
__p__fmode
_initterm
_adjust_fdiv
srand
_cexit
Sections
.text Size: 171KB - Virtual size: 171KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 556KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ