Static task
static1
Behavioral task
behavioral1
Sample
12b53862687cf540026f5a03de5efe897b2d757ddd3ae2244c91971f16ea33b3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
12b53862687cf540026f5a03de5efe897b2d757ddd3ae2244c91971f16ea33b3.exe
Resource
win10v2004-20220901-en
General
-
Target
12b53862687cf540026f5a03de5efe897b2d757ddd3ae2244c91971f16ea33b3
-
Size
648KB
-
MD5
718131a2a1edfc7b15a7dcc392db8a90
-
SHA1
7e1854af13bcf38a1b86053abdbb431f4a0d327f
-
SHA256
12b53862687cf540026f5a03de5efe897b2d757ddd3ae2244c91971f16ea33b3
-
SHA512
03594035f08fd5511a20d7928ef8e6688895747c46c3bde283b289d6e07888fd2dec75942df508d92d703ee61e113d9fbabb092f8ef4df5a34d07224a53027d6
-
SSDEEP
12288:VxI4jn/sz4xrb2pgT4o4q8sJqqkencM/K8CqiZY++LkJMRRRR+6FQIROzcicd:VxI4LszG2pg/oMQqT++pO
Malware Config
Signatures
Files
-
12b53862687cf540026f5a03de5efe897b2d757ddd3ae2244c91971f16ea33b3.exe windows x86
a2cb34fb369858768deb659c7b4dda48
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc80
ord1934
ord3210
ord3161
ord1063
ord5637
ord1794
ord3641
ord4580
ord6065
ord6090
ord1395
ord501
ord709
ord1903
ord2164
ord347
ord602
ord2367
ord1279
ord1280
ord3182
ord4262
ord4486
ord2862
ord5200
ord1599
ord1655
ord1656
ord1964
ord5175
ord1362
ord4967
ord3345
ord6277
ord3802
ord6279
ord1522
ord2172
ord2178
ord2405
ord2387
ord2385
ord2403
ord2415
ord2392
ord2408
ord2413
ord2396
ord2398
ord2400
ord2394
ord2410
ord2390
ord934
ord930
ord932
ord928
ord923
ord5233
ord5235
ord5960
ord1600
ord4282
ord4722
ord3403
ord5203
ord4185
ord6275
ord5073
ord1908
ord5152
ord4244
ord1401
ord3946
ord1617
ord1620
ord5912
ord6724
ord1551
ord605
ord1671
ord2020
ord4890
ord4735
ord4212
ord5182
ord265
ord266
ord1187
ord784
ord380
ord5493
ord2703
ord2702
ord3201
ord384
ord629
ord5111
ord5283
ord5089
ord6288
ord1439
ord1185
ord6286
ord1181
ord5320
ord6297
ord5331
ord3255
ord6703
ord299
ord1489
ord3423
ord572
ord587
ord3684
ord4115
ord3761
ord5731
ord1929
ord5214
ord4232
ord1402
ord5915
ord6725
ord1545
ord3551
ord715
ord6017
ord1581
ord1643
ord3576
ord741
ord2368
ord4240
ord1591
ord1207
ord354
ord310
ord578
ord4038
ord4014
ord6278
ord3801
ord6276
ord4326
ord2063
ord2018
ord5583
ord3806
ord1010
ord5102
ord6219
ord5382
ord3832
ord1920
ord2931
ord5224
ord5226
ord3948
ord4568
ord5230
ord5213
ord5566
ord2537
ord2731
ord2835
ord4307
ord2714
ord2838
ord2540
ord2646
ord2533
ord3718
ord3719
ord3709
ord2644
ord3949
ord4481
ord4261
ord3333
ord2248
ord762
ord1084
ord1054
ord3830
ord757
ord566
ord3683
ord4541
ord1670
ord764
msvcr80
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
?terminate@@YAXXZ
_except_handler4_common
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_invoke_watson
_cexit
__getmainargs
_amsg_exit
_stricmp
_decode_pointer
_onexit
_lock
__dllonexit
memset
free
_strdup
_purecall
_setmbcp
sprintf
_exit
_controlfp_s
memcpy_s
__CxxFrameHandler3
_unlock
_CxxThrowException
_encode_pointer
kernel32
lstrlenA
CloseHandle
LeaveCriticalSection
EnterCriticalSection
GetModuleFileNameA
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
OpenProcess
MoveFileExA
MulDiv
Sleep
InterlockedCompareExchange
GetStartupInfoA
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
user32
SetPropA
GetTopWindow
IsWindowVisible
GetWindow
GetWindowLongA
FindWindowA
GetPropA
OffsetRect
EnableWindow
ReleaseDC
GetDC
InvalidateRect
DrawIcon
GetParent
SetRect
LoadIconA
LoadBitmapA
SetTimer
IsIconic
CopyRect
GetClientRect
GetSystemMetrics
SendMessageA
GetWindowThreadProcessId
gdi32
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
GetObjectA
StretchBlt
msimg32
TransparentBlt
comctl32
InitCommonControlsEx
_TrackMouseEvent
shlwapi
PathAddExtensionA
PathRemoveExtensionA
PathFindFileNameA
ole32
CoUninitialize
CoInitialize
Sections
.text Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 520KB - Virtual size: 517KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
St� Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE