Static task
static1
Behavioral task
behavioral1
Sample
c739b9d1c5160808a9132a772ac94defad65972b3e95bf3666bec0c341b72f0d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c739b9d1c5160808a9132a772ac94defad65972b3e95bf3666bec0c341b72f0d.exe
Resource
win10v2004-20220901-en
General
-
Target
c739b9d1c5160808a9132a772ac94defad65972b3e95bf3666bec0c341b72f0d
-
Size
496KB
-
MD5
542f9348faf21c536fa0a060a1e4b350
-
SHA1
0ac6f395ce0d0701b92cef066b8164c0a8c9290f
-
SHA256
c739b9d1c5160808a9132a772ac94defad65972b3e95bf3666bec0c341b72f0d
-
SHA512
11e843da928b1adfc80c28886be688fd48a40563567ce6aff5e932ea6a26981af5e915567f77831003150b220f0e1b81dcf01cd0cc408f07f2f3024594d9641b
-
SSDEEP
12288:LqPMJ0RNG3GZXnRe7T0Zr55h9sb3Qt/hs:1JKOG1nR6wVLuQti
Malware Config
Signatures
Files
-
c739b9d1c5160808a9132a772ac94defad65972b3e95bf3666bec0c341b72f0d.exe windows x86
c04bfbdeb48a2b96f5dc1ed2eedf8008
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetThreadDesktop
GetGUIThreadInfo
GetLastActivePopup
ChildWindowFromPoint
IsCharLowerW
DestroyWindow
LoadIconA
SetTimer
GetDlgItem
EndDialog
PostMessageA
MessageBoxW
SetWindowTextW
SetWindowTextA
LoadStringW
LoadStringA
SetWindowLongA
GetWindowLongA
DialogBoxParamW
DialogBoxParamA
ShowWindow
CharLowerW
CharLowerA
CharUpperW
CharUpperA
LoadMenuA
SendMessageA
GetWindowThreadProcessId
OffsetRect
IsWindow
TranslateMessage
DispatchMessageA
GetMenuState
DispatchMessageW
SystemParametersInfoA
KillTimer
RegisterClipboardFormatA
GetClipboardData
CreatePopupMenu
EnableWindow
VkKeyScanA
GetGuiResources
CopyImage
DrawAnimatedRects
DdeFreeStringHandle
EmptyClipboard
UpdateLayeredWindow
GetFocus
ScrollDC
comdlg32
GetSaveFileNameW
shell32
SHGetFileInfoW
ole32
CoTaskMemFree
OleTranslateAccelerator
advapi32
RegDeleteValueW
RegEnumValueA
RegEnumValueW
RegOpenKeyExW
RegCloseKey
RegDeleteKeyW
RegEnumKeyW
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
gdi32
GetClipBox
PatBlt
SetWindowOrgEx
SetDIBColorTable
GetICMProfileW
GetFontData
SetBrushOrgEx
BitBlt
ColorMatchToTarget
SetStretchBltMode
CopyEnhMetaFileW
GetTextMetricsA
GetPolyFillMode
GetViewportExtEx
GetRasterizerCaps
CreateCompatibleBitmap
comctl32
ImageList_Destroy
ImageList_Create
ImageList_AddMasked
version
GetFileVersionInfoA
mpr
WNetOpenEnumA
WNetGetUniversalNameA
WNetGetConnectionA
WNetEnumResourceA
WNetCloseEnum
kernel32
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
GetTimeZoneInformation
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoA
lstrcmpA
IsValidCodePage
WritePrivateProfileStringA
VirtualFree
VirtualAlloc
UnmapViewOfFile
TransactNamedPipe
SetHandleCount
GetOEMCP
TerminateProcess
SizeofResource
SetNamedPipeHandleState
SetLastError
SetFileAttributesA
HeapAlloc
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
HeapSize
GetFileType
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
HeapCreate
HeapFree
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
CompareStringW
SetEnvironmentVariableA
WriteProfileStringA
GetExitCodeProcess
SetCurrentDirectoryA
RemoveDirectoryA
ReleaseMutex
QueryPerformanceCounter
OpenProcess
OpenMutexA
MoveFileExA
MoveFileA
GetCommMask
GetFileInformationByHandle
RequestDeviceWakeup
ConvertFiberToThread
AreFileApisANSI
FlushViewOfFile
SetPriorityClass
TerminateThread
LocalAlloc
GetCurrentProcessId
MapViewOfFile
GetModuleFileNameW
lstrcmpiA
VirtualProtectEx
LoadLibraryExA
lstrcpynW
GetDiskFreeSpaceExW
GetTimeFormatA
LockResource
GetEnvironmentVariableW
HeapReAlloc
SetFilePointer
CreateDirectoryW
GetExitCodeThread
DeviceIoControl
InitializeCriticalSectionAndSpinCount
CreateFileA
VirtualProtect
GetCurrentThread
IsDebuggerPresent
SetEndOfFile
IsDBCSLeadByteEx
GetUserDefaultLCID
lstrcatW
DuplicateHandle
SetEnvironmentVariableW
WaitForDebugEvent
lstrcpynA
DeleteFileW
FindFirstFileW
FindNextFileW
FindClose
MultiByteToWideChar
ReadFile
WriteFile
MulDiv
lstrlenA
WideCharToMultiByte
GetPrivateProfileStringW
WritePrivateProfileStringW
FreeLibrary
LoadLibraryExW
GetModuleHandleW
GlobalFree
WaitForSingleObject
GlobalAlloc
ExpandEnvironmentStringsW
GetTempFileNameW
CreateProcessW
LoadLibraryW
CreateThread
GlobalLock
GlobalUnlock
GetDiskFreeSpaceW
lstrlenW
CloseHandle
SetErrorMode
GetCommandLineW
GetTempPathW
GetWindowsDirectoryW
ExitProcess
CopyFileW
GetCurrentProcess
GetFileSize
CreateFileW
GetTickCount
Sleep
SetFileAttributesW
GetLastError
GetFileAttributesW
SetCurrentDirectoryW
MoveFileW
GetFullPathNameW
GetShortPathNameW
SearchPathW
CompareFileTime
SetFileTime
CompareStringA
CopyFileA
CreateDirectoryA
CreateEventA
CreateFileMappingA
CreateMutexA
CreateNamedPipeA
CreateProcessA
DeleteFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindFirstFileA
FindNextFileA
FindResourceA
FlushFileBuffers
FormatMessageA
FreeResource
GetACP
GetCommandLineA
GetComputerNameA
GetCurrentDirectoryA
GetCurrentThreadId
GetDiskFreeSpaceA
GetDriveTypeA
GetEnvironmentVariableA
GetFileAttributesA
GetFullPathNameA
GetLocalTime
GetLocaleInfoA
GetLogicalDrives
GetModuleFileNameA
GetModuleHandleA
GetOverlappedResult
GetPrivateProfileStringA
GetProcAddress
GetProfileStringA
GetShortPathNameA
GetSystemDefaultLCID
GetSystemDirectoryA
GetSystemInfo
GetSystemTimeAsFileTime
GetUserDefaultLangID
GetVersion
GetVersionExA
GetWindowsDirectoryA
GlobalAddAtomA
GlobalDeleteAtom
GlobalHandle
GlobalReAlloc
IsBadWritePtr
IsDBCSLeadByte
LoadLibraryA
LoadResource
LocalFileTimeToFileTime
LocalFree
Sections
.text Size: 153KB - Virtual size: 153KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 161KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 315KB - Virtual size: 315KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ