Static task
static1
Behavioral task
behavioral1
Sample
61d0c022a58b87574e2f48ac7370ee2b05e4aa205cee828b791b93e7be507a00.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
61d0c022a58b87574e2f48ac7370ee2b05e4aa205cee828b791b93e7be507a00.exe
Resource
win10v2004-20220812-en
General
-
Target
61d0c022a58b87574e2f48ac7370ee2b05e4aa205cee828b791b93e7be507a00
-
Size
570KB
-
MD5
09c4bd7dfbec91888aa0582b0154a240
-
SHA1
b8d1bae00a98f1ea4e668d4b96c64237cf017f88
-
SHA256
61d0c022a58b87574e2f48ac7370ee2b05e4aa205cee828b791b93e7be507a00
-
SHA512
67c6953d10cf4bcabee92b9568f91e8604e9017ba7bdbeb9747dfc1f48bce3e4bce7b8e72442dae238708188501f997c48b8488930789c97114b47d182b11a34
-
SSDEEP
12288:JMJmAUupxwIY9SxjkYo4yfhkHKXEnecxz7TVUnBkh148V1nQ2kvTao3Hh:vFdUxjy1hkSEnHJTKkX4V2w9
Malware Config
Signatures
Files
-
61d0c022a58b87574e2f48ac7370ee2b05e4aa205cee828b791b93e7be507a00.exe windows x86
5aa8a8d8be6d9420257a578247b28da2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DispatchMessageA
SendMessageA
InvalidateRect
SetForegroundWindow
MoveWindow
DestroyMenu
PostQuitMessage
LoadBitmapA
SetWindowPos
IsWindow
GetDC
GetCursorPos
ReleaseDC
GetClientRect
GetKeyState
DestroyWindow
GetMessageA
GetParent
UpdateWindow
ShowWindow
SetCapture
EnableWindow
MapWindowPoints
TranslateMessage
IsWindowEnabled
LoadStringA
IsIconic
RegisterClassA
GetSubMenu
CreateWindowExA
FillRect
SetCursor
EndPaint
SetFocus
PeekMessageA
BeginPaint
DefWindowProcA
GetSystemMetrics
GetWindowRect
PostMessageA
ReleaseCapture
SetWindowLongA
SetWindowTextA
CheckMenuItem
GetWindowLongA
SetTimer
GetDlgItem
ScreenToClient
LoadCursorA
TrackPopupMenu
GetDesktopWindow
EndDialog
GetFocus
SetDlgItemTextA
MessageBoxA
GetSysColor
SystemParametersInfoA
IsWindowVisible
wsprintfA
DrawTextA
gdi32
CreateSolidBrush
SetTextColor
GetStockObject
DeleteObject
SetBkColor
ole32
CoTaskMemFree
CoInitialize
kernel32
GetLocalTime
InterlockedDecrement
UnhandledExceptionFilter
LoadLibraryExA
GetModuleFileNameA
FlushFileBuffers
ExitProcess
IsDebuggerPresent
GetModuleFileNameW
SetLastError
FormatMessageA
TlsGetValue
GetStdHandle
FindClose
ReleaseMutex
FileTimeToSystemTime
GetFileAttributesA
WaitForSingleObject
FindNextFileA
HeapDestroy
GetFileAttributesW
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetCurrentDirectoryA
GetConsoleMode
GetLocaleInfoA
LocalAlloc
lstrcatA
SetErrorMode
FreeEnvironmentStringsW
MultiByteToWideChar
GetLocaleInfoW
GetTempPathA
WideCharToMultiByte
lstrcmpiA
GetStringTypeA
GetSystemTimeAsFileTime
InterlockedExchange
SetStdHandle
HeapReAlloc
LoadResource
InitializeCriticalSection
GetExitCodeProcess
FormatMessageW
GetConsoleOutputCP
WaitForMultipleObjects
GetStringTypeW
GetFullPathNameA
SetEvent
VirtualAlloc
FindResourceA
IsBadReadPtr
Sleep
CreateProcessW
WriteFile
UnmapViewOfFile
CreateProcessA
SizeofResource
GetVersion
GetModuleHandleW
GetACP
lstrcpynA
CloseHandle
ReadFile
GetModuleHandleA
TlsFree
MapViewOfFile
CompareStringA
RaiseException
GetCurrentThread
InterlockedCompareExchange
GetCommandLineA
HeapSize
GetCPInfo
GetCommandLineW
LockResource
GetCurrentProcessId
GetEnvironmentStrings
FileTimeToLocalFileTime
VirtualFree
GetShortPathNameA
lstrlenW
GlobalAlloc
GlobalUnlock
GetEnvironmentStringsW
GetThreadLocale
FindNextFileW
LCMapStringA
FindResourceW
GetConsoleCP
lstrlenA
HeapCreate
LCMapStringW
LoadLibraryExW
GetLastError
LeaveCriticalSection
HeapAlloc
CreateFileA
TlsSetValue
GetFileType
CreateEventA
CreateFileW
GetTimeZoneInformation
GlobalLock
SetFilePointer
DuplicateHandle
FindFirstFileW
ResetEvent
lstrcpyA
GlobalFree
FindFirstFileA
CompareStringW
GetProcessHeap
GetSystemInfo
GetProcAddress
DeleteFileW
GetWindowsDirectoryA
DeleteFileA
GetFileSize
GetStartupInfoA
FreeLibrary
LoadLibraryA
GetVersionExA
TlsAlloc
GetTickCount
QueryPerformanceCounter
GetOEMCP
GetVersionExW
LoadLibraryW
SetHandleCount
EnterCriticalSection
HeapFree
WriteConsoleW
InterlockedIncrement
GetCurrentThreadId
SetEndOfFile
CreateEventW
VirtualQuery
WriteConsoleA
TerminateProcess
SetEnvironmentVariableA
GetSystemDirectoryA
MulDiv
SetUnhandledExceptionFilter
SetFileAttributesA
CreateThread
LocalFree
advapi32
RegDeleteValueA
RegCloseKey
RegOpenKeyExW
RegOpenKeyExA
RegCreateKeyExW
RegQueryValueExA
RegSetValueExA
GetTokenInformation
OpenProcessToken
RegSetValueExW
RegQueryValueExW
RegCreateKeyExA
msvcrt
free
exit
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_strcmpi
Sections
.text Size: 335KB - Virtual size: 334KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.0rdata Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE