Static task
static1
Behavioral task
behavioral1
Sample
4870ef2516fbe03fbd592006eb2dfc757ef919f538a20a31039a940dc67eac2e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4870ef2516fbe03fbd592006eb2dfc757ef919f538a20a31039a940dc67eac2e.exe
Resource
win10v2004-20220812-en
General
-
Target
4870ef2516fbe03fbd592006eb2dfc757ef919f538a20a31039a940dc67eac2e
-
Size
189KB
-
MD5
7aba249eb6109e9d91ff854c907a26d0
-
SHA1
d9891b59e35c9249ef3fdc1ebbd369256fbc01a7
-
SHA256
4870ef2516fbe03fbd592006eb2dfc757ef919f538a20a31039a940dc67eac2e
-
SHA512
fb25cadd317e65622262d17a4d3be82b3ce421b98a21587524c7dda546d00bd082b678f86a8856930e357e11a0503a204ed990db8c936e4aac4c77b68a4369cb
-
SSDEEP
3072:WcZON478fYBP7EbJkBeyz7x7ZVMCme49ZBDEdbdhFNgrgd5Tv8WUMcn+h:WAsPAEJsL7YLZBDE3ht5
Malware Config
Signatures
Files
-
4870ef2516fbe03fbd592006eb2dfc757ef919f538a20a31039a940dc67eac2e.exe windows x86
42ffe0ab2b12cf307497c18d0e0f1cb9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RaiseException
HeapReAlloc
HeapSize
GetCPInfo
GetACP
HeapAlloc
GetOEMCP
UnhandledExceptionFilter
HeapFree
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
TerminateProcess
ExitProcess
GetProcessVersion
GetLocaleInfoA
GetLocaleInfoW
GetLastError
OutputDebugStringA
GetModuleFileNameA
GetVersionExA
GlobalFree
GlobalLock
WritePrivateProfileStringA
GetPrivateProfileStringA
GetVersion
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
FindResourceA
LoadResource
CloseHandle
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
RtlUnwind
SetErrorMode
GlobalGetAtomNameA
GlobalAddAtomA
GetThreadLocale
GetStringTypeExA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
IsBadCodePtr
GetSystemDirectoryA
SetLastError
GlobalAlloc
GetCurrentDirectoryA
lstrcpyA
GetPrivateProfileIntA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
LocalFree
lstrcpynA
MulDiv
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedIncrement
InterlockedDecrement
lstrcatA
LoadLibraryA
GetProcAddress
FreeLibrary
GlobalUnlock
LockResource
SetStdHandle
IsBadReadPtr
IsBadWritePtr
user32
ShowWindow
LoadStringA
DestroyMenu
GetDC
ReleaseDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
LoadCursorA
ReleaseCapture
GetDesktopWindow
WindowFromPoint
ClientToScreen
GetClassNameA
PtInRect
InsertMenuA
DeleteMenu
GetMenuStringA
GetSysColorBrush
CharUpperA
FindWindowA
InvalidateRect
SetRectEmpty
LoadAcceleratorsA
TranslateAcceleratorA
LoadMenuA
SetMenu
ReuseDDElParam
UnpackDDElParam
BringWindowToTop
UpdateWindow
SendDlgItemMessageA
SystemParametersInfoA
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
EqualRect
DeferWindowPos
BeginDeferWindowPos
CopyRect
EndDeferWindowPos
ScreenToClient
ScrollWindow
SetScrollInfo
ShowScrollBar
SetScrollRange
IsDialogMessageA
SetWindowTextA
GetTopWindow
IsChild
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetMenu
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
CreateWindowExA
UnhookWindowsHookEx
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetWindow
GetWindowRect
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
EndDialog
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetParent
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
MessageBoxA
SetCursor
ShowOwnedPopups
PostQuitMessage
PostMessageA
EnableWindow
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
GetSystemMenu
AppendMenuA
SendMessageA
LoadIconA
GetScrollPos
SetScrollPos
SetPropA
UnregisterClassA
gdi32
GetObjectA
SaveDC
RestoreDC
SelectObject
GetStockObject
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
SetTextColor
DeleteObject
CreateBitmap
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetBkColor
DeleteDC
comdlg32
GetOpenFileNameA
GetSaveFileNameA
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
ControlService
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
OpenSCManagerA
OpenServiceA
CloseServiceHandle
shell32
DragFinish
DragQueryFileA
comctl32
ord17
ImageList_Destroy
Sections
.text Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 39KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ljindcp Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE