Static task
static1
Behavioral task
behavioral1
Sample
1fb9539280cdba5db6d6b8dd84e0b2e403778b1d8f573ad8262fbd70bf16ce2e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1fb9539280cdba5db6d6b8dd84e0b2e403778b1d8f573ad8262fbd70bf16ce2e.exe
Resource
win10v2004-20220901-en
General
-
Target
1fb9539280cdba5db6d6b8dd84e0b2e403778b1d8f573ad8262fbd70bf16ce2e
-
Size
342KB
-
MD5
62244c9b42bf745f85d63181895fe8d7
-
SHA1
7f3070325328c8e850809a229dcf5be4ceaad519
-
SHA256
1fb9539280cdba5db6d6b8dd84e0b2e403778b1d8f573ad8262fbd70bf16ce2e
-
SHA512
8084d3a532a05f6f8c9b5bca0d0f7f4564dd15324d4a641777ce197285d557fc3c7cb5b4e1912273204a9be15c5269ee74e479f9a78aa65c82498c126a4ce7b0
-
SSDEEP
6144:yxsspxEYc+SIDm44+9qJ29ZOgG78wCeB8EPnuAq:ydvyIDmncJ9OR8EPj
Malware Config
Signatures
Files
-
1fb9539280cdba5db6d6b8dd84e0b2e403778b1d8f573ad8262fbd70bf16ce2e.exe windows x64
41b7692e75dc6d55b8f3a5f355eb00e7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
HeapFree
HeapAlloc
HeapReAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlLookupFunctionEntry
RtlUnwindEx
RaiseException
RtlPcToFileHeader
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
FlsGetValue
FlsSetValue
FlsFree
FlsAlloc
Sleep
HeapSetInformation
HeapCreate
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetACP
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetErrorMode
CreateFileA
GetCurrentProcess
GetThreadLocale
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetOEMCP
GetCPInfo
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
GlobalHandle
GlobalReAlloc
TlsAlloc
InitializeCriticalSection
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
WritePrivateProfileStringA
GlobalFree
FormatMessageA
LocalFree
GlobalUnlock
GetCurrentProcessId
CloseHandle
GetModuleFileNameW
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
SetLastError
lstrcmpW
GetVersionExA
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetLocaleInfoA
FindResourceA
LoadResource
LockResource
SizeofResource
GlobalLock
lstrcmpA
GlobalAlloc
GlobalDeleteAtom
GetModuleHandleA
GetVersion
CompareStringA
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
ExitProcess
CreateProcessA
FreeLibrary
GetProcAddress
LoadLibraryA
GetLastError
user32
GetMenuItemInfoA
GetSysColorBrush
UnregisterClassA
ClientToScreen
SetWindowTextA
UnpackDDElParam
ReuseDDElParam
LoadMenuA
DestroyMenu
ReleaseCapture
LoadAcceleratorsA
InvalidateRect
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
SetMenu
ShowWindow
TranslateAcceleratorA
GetWindowThreadProcessId
IsWindowEnabled
ShowOwnedPopups
SetCursor
GetMessageA
TranslateMessage
GetActiveWindow
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
InflateRect
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
GetClassLongPtrA
SetPropA
GetPropA
RemovePropA
GetFocus
IsWindow
SetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
GetTopWindow
DestroyWindow
GetWindowLongPtrA
SetWindowLongPtrA
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
TrackPopupMenu
GetKeyState
EnableWindow
FindWindowA
LoadIconA
LoadCursorA
GetDesktopWindow
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetClientRect
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
GetWindowDC
ReleaseDC
GetDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
LoadBitmapA
FillRect
PostQuitMessage
PostMessageA
GetWindow
GetSystemMetrics
GetWindowRect
GetWindowPlacement
IsIconic
SystemParametersInfoA
IntersectRect
OffsetRect
SetWindowPos
SetWindowLongA
GetWindowLongA
CallWindowProcA
DefWindowProcA
SendMessageA
RegisterClassA
GetSysColor
AdjustWindowRectEx
GetParent
ScreenToClient
EqualRect
DeferWindowPos
CopyRect
PtInRect
GetDlgCtrlID
gdi32
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
CreatePatternBrush
GetStockObject
SetViewportExtEx
CreateSolidBrush
CreateFontIndirectA
GetTextExtentPoint32A
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetPixel
SetMapMode
SetBkMode
RestoreDC
SaveDC
DeleteObject
GetDeviceCaps
CreateCompatibleDC
CreateCompatibleBitmap
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
BitBlt
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
DragQueryFileA
DragFinish
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 192KB - Virtual size: 192KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
�[ Size: 56KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE