Static task
static1
Behavioral task
behavioral1
Sample
f5b0c2a6f9ddbb04649b0853fa0725b9672274eb374cbe00a9fcd902c4f33856.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f5b0c2a6f9ddbb04649b0853fa0725b9672274eb374cbe00a9fcd902c4f33856.exe
Resource
win10v2004-20220812-en
General
-
Target
f5b0c2a6f9ddbb04649b0853fa0725b9672274eb374cbe00a9fcd902c4f33856
-
Size
708KB
-
MD5
5d17da2614f3cba4d72a7b29ecb7922f
-
SHA1
9388582a1df87718a725dcbe532958e80740c678
-
SHA256
f5b0c2a6f9ddbb04649b0853fa0725b9672274eb374cbe00a9fcd902c4f33856
-
SHA512
4dac26f571d26680793fcb30ec090f5b2a80c369553f3d50ce144f7a2aa0ddb7daf138e55801834f26c435923e759514d6cdad6834c25b493510778af626d655
-
SSDEEP
6144:Bm2lqsev9MpQSFx+SsTekHeuFD7I/TUXP1AcMHrK5T0ypnS:Bm/8QSFxVsETAXPWHrcJ5S
Malware Config
Signatures
Files
-
f5b0c2a6f9ddbb04649b0853fa0725b9672274eb374cbe00a9fcd902c4f33856.exe windows x86
f879a8d2c11674a6dd0fca0465234284
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
KillTimer
PeekMessageA
DispatchMessageA
TranslateMessage
GetMessageA
DefWindowProcA
IsWindow
SendMessageA
CreateWindowExA
DestroyWindow
LoadIconA
LoadCursorA
RegisterClassExA
SetWindowTextA
SetTimer
ShowWindow
FindWindowA
LoadStringA
PostMessageA
winspool.drv
EnumJobsA
OpenPrinterA
SetJobA
GetJobA
GetPrinterDriverDirectoryA
GetPrinterDataA
ClosePrinter
kernel32
FatalAppExitA
GetSystemTimeAsFileTime
QueryPerformanceCounter
lstrcpynA
GetModuleFileNameA
GetModuleHandleA
GetLastError
ExpandEnvironmentStringsA
ProcessIdToSessionId
GetCurrentProcessId
CloseHandle
ReleaseMutex
GetCurrentThreadId
WaitForSingleObject
CreateMutexA
OpenMutexA
FormatMessageA
DeleteFileA
GetWindowsDirectoryA
GetTickCount
VirtualAlloc
GetConsoleCP
GetFileSize
CreateFileA
GetLocalTime
WideCharToMultiByte
MultiByteToWideChar
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcess
GetProcAddress
GetVersionExA
LoadLibraryA
FreeLibrary
OutputDebugStringA
PeekNamedPipe
ReadFile
LocalFree
GetUserDefaultLangID
WriteFile
HeapReAlloc
GetConsoleMode
FlushFileBuffers
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
SetConsoleCtrlHandler
SetEnvironmentVariableA
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetTimeZoneInformation
CreateFileW
SetEndOfFile
CompareStringA
CompareStringW
SetFilePointer
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
Sleep
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
RtlUnwind
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoA
LCMapStringA
LCMapStringW
GetCPInfo
ExitProcess
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThread
GetACP
GetOEMCP
IsValidCodePage
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
gdi32
GetStockObject
advapi32
RegEnumValueA
SetKernelObjectSecurity
GetSecurityDescriptorDacl
SetSecurityInfo
InitializeAcl
AddAccessAllowedAce
IsValidSid
GetLengthSid
GetAce
AllocateAndInitializeSid
FreeSid
RegCreateKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegSetValueExA
RegDeleteValueA
RegFlushKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
Sections
.text Size: 584KB - Virtual size: 580KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ