Static task
static1
Behavioral task
behavioral1
Sample
5c42a229085a7e65ccb1bbe7d5f554ed2a90bc6b8e6aad6188bcdf960f322de2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5c42a229085a7e65ccb1bbe7d5f554ed2a90bc6b8e6aad6188bcdf960f322de2.exe
Resource
win10v2004-20220812-en
General
-
Target
5c42a229085a7e65ccb1bbe7d5f554ed2a90bc6b8e6aad6188bcdf960f322de2
-
Size
139KB
-
MD5
159d1aeea8e96466292b8698e68f1150
-
SHA1
0808b76a7d7a0442ebd6950869b8e690e19a8345
-
SHA256
5c42a229085a7e65ccb1bbe7d5f554ed2a90bc6b8e6aad6188bcdf960f322de2
-
SHA512
91e2981566d1dc9ffe5f32eded2dee101b99b845b22359e353c61ecbddcd725c67854d72517a9e784b822dfedc33303b1ca90ecb12ee2bf8a88a12b73134a131
-
SSDEEP
3072:3+xNW/jxsvvKmK8VLNWySJL1sQqiR7/0HvcdavjlekzmrcZGytB:iNW/S3KH81NK1XeCMD
Malware Config
Signatures
Files
-
5c42a229085a7e65ccb1bbe7d5f554ed2a90bc6b8e6aad6188bcdf960f322de2.exe windows x86
310bc56415a832bde913dc65d82431b7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
GetModuleFileNameA
GetFileAttributesA
WritePrivateProfileSectionA
DeleteFileA
ReadFile
SetFileAttributesA
FormatMessageA
GetLastError
CopyFileA
GetPrivateProfileSectionA
CreateDirectoryA
GetSystemInfo
GetShortPathNameA
WriteFile
GetExitCodeProcess
CreateProcessA
_llseek
_lwrite
_lread
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileInformationByHandle
GetTickCount
_lclose
GlobalUnlock
GlobalLock
SetLastError
GlobalFree
MoveFileA
GetTempPathA
GetTempFileNameA
FreeResource
LockResource
LoadResource
SizeofResource
FindResourceExA
EnumResourceLanguagesA
EnumResourceNamesA
FreeLibrary
EnumResourceTypesA
LoadLibraryExA
GlobalAlloc
GetCurrentDirectoryA
GetSystemTime
MultiByteToWideChar
WideCharToMultiByte
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoA
GetPrivateProfileIntA
HeapFree
lstrcpynA
ExitProcess
GetProcAddress
GetModuleHandleA
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
HeapDestroy
HeapCreate
VirtualFree
LCMapStringA
LCMapStringW
GetACP
GetOEMCP
GetCPInfo
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
LoadLibraryA
InitializeCriticalSection
RtlUnwind
InterlockedExchange
VirtualQuery
SetFilePointer
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
VirtualProtect
SetStdHandle
FlushFileBuffers
GetFullPathNameA
lstrcmpiA
LocalAlloc
lstrcatA
lstrlenA
lstrcpyA
IsDBCSLeadByte
FindFirstFileA
FindClose
GetPrivateProfileStringA
lstrcmpA
HeapAlloc
WritePrivateProfileStringA
CreateFileA
CloseHandle
GetCommandLineA
LocalFree
gdi32
GetStockObject
DeleteObject
GetDeviceCaps
GetObjectA
CreateFontIndirectA
user32
LoadStringA
SendMessageA
ReleaseDC
GetDC
CharNextA
SendDlgItemMessageA
GetSystemMetrics
MessageBoxA
MessageBeep
wsprintfA
SetFocus
PostMessageA
SetDlgItemTextA
GetDlgItemTextA
IsDlgButtonChecked
CheckDlgButton
ShowWindow
GetWindowRect
CheckRadioButton
MsgWaitForMultipleObjects
DispatchMessageA
PeekMessageA
GetParent
SetWindowLongA
GetWindowLongA
CallWindowProcA
EnableWindow
GetDlgItem
CharPrevA
comctl32
CreatePropertySheetPageA
DestroyPropertySheetPage
PropertySheetA
comdlg32
GetOpenFileNameA
GetSaveFileNameA
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
imagehlp
CheckSumMappedFile
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
Sections
.text Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 57KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rmyflqw Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE