Static task
static1
Behavioral task
behavioral1
Sample
5b48ca3d1cf5044235a409c1acf5cb7158322040039e18da864e59d2db3695e9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5b48ca3d1cf5044235a409c1acf5cb7158322040039e18da864e59d2db3695e9.exe
Resource
win10v2004-20220812-en
General
-
Target
5b48ca3d1cf5044235a409c1acf5cb7158322040039e18da864e59d2db3695e9
-
Size
596KB
-
MD5
6b4138a110f1f15d4ee36f1afbacf7d0
-
SHA1
32f09b8a72f6667345822ffa0fd3abfee6184106
-
SHA256
5b48ca3d1cf5044235a409c1acf5cb7158322040039e18da864e59d2db3695e9
-
SHA512
3d2e15f7fb1450fe8c3a4f5d7d87fa834492f2a40c4471ba3b824973113e78ed8c94f62b518a7934ecc11af90a08994dbf675cdbf5644238a197b566fef2cc97
-
SSDEEP
12288:tux6FU67yW+UulbqeFK3dAAWxLXqs76ve7I+L:w+L7uUxe8AAWVR76v9
Malware Config
Signatures
Files
-
5b48ca3d1cf5044235a409c1acf5cb7158322040039e18da864e59d2db3695e9.exe windows x86
162763d9295610c43464d39179ef8789
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
GetSystemInfo
VirtualQuery
RtlUnwind
ExitProcess
TerminateProcess
GetStartupInfoA
GetCommandLineA
GetSystemTimeAsFileTime
ExitThread
CreateThread
SetEnvironmentVariableA
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
QueryPerformanceCounter
GetTickCount
VirtualProtect
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetTimeZoneInformation
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
GetLocaleInfoW
HeapFree
HeapAlloc
SetErrorMode
RaiseException
GetOEMCP
GetCPInfo
InterlockedIncrement
GlobalFlags
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
InterlockedDecrement
WritePrivateProfileStringA
ResumeThread
lstrcmpA
GetModuleFileNameA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
GlobalFree
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
lstrcpynA
GetThreadLocale
GetLocaleInfoA
GetACP
CreateFileA
FreeLibrary
CreateDirectoryA
CreateProcessA
GetExitCodeProcess
GetSystemDirectoryA
GetWindowsDirectoryA
LocalAlloc
GetCurrentProcess
GetVersionExA
GetCurrentThread
FormatMessageA
LocalFree
SetLastError
GetUserDefaultLangID
CopyFileA
FindResourceA
LockResource
SizeofResource
GetShortPathNameA
GetFileAttributesA
SetFileAttributesA
GetCurrentDirectoryA
SetCurrentDirectoryA
FindResourceExA
LoadResource
CreateToolhelp32Snapshot
Sleep
Process32First
Process32Next
CloseHandle
GetTempPathA
FindFirstFileA
DeleteFileA
FindNextFileA
FindClose
RemoveDirectoryA
GetModuleHandleA
LoadLibraryA
GetProcAddress
CreateMutexA
WaitForSingleObject
ReleaseMutex
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetCurrentProcessId
InterlockedExchange
user32
GetSysColorBrush
GetMenuItemInfoA
InflateRect
LoadMenuA
DestroyMenu
UnpackDDElParam
ReuseDDElParam
ReleaseCapture
LoadAcceleratorsA
InvalidateRect
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
SetMenu
TranslateAcceleratorA
GetMessageA
GetCursorPos
ValidateRect
ShowOwnedPopups
SetCursor
PostQuitMessage
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
IsWindowEnabled
ShowWindow
SetWindowTextA
IsDialogMessageA
GetMenuState
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
IsWindow
SetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
LoadIconA
MapWindowPoints
TrackPopupMenu
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetClientRect
GetMenu
PostMessageA
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetSysColor
AdjustWindowRectEx
GetParent
ScreenToClient
EqualRect
DeferWindowPos
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
CopyRect
PtInRect
GetWindow
PeekMessageA
TranslateMessage
DispatchMessageA
wsprintfA
SystemParametersInfoA
DefWindowProcA
MessageBoxA
BroadcastSystemMessageA
SendMessageA
SetTimer
LoadCursorA
EnableWindow
SetWindowsHookExA
gdi32
TextOutA
RectVisible
PtVisible
BitBlt
DeleteObject
GetTextExtentPoint32A
CreateFontIndirectA
CreateCompatibleBitmap
CreateSolidBrush
GetStockObject
CreateCompatibleDC
CreatePatternBrush
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
GetPixel
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateBitmap
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
ExtTextOutA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
ImpersonateSelf
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
OpenProcessToken
FreeSid
RevertToSelf
AccessCheck
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
RegCreateKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
OpenThreadToken
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
shell32
DragFinish
DragQueryFileA
ShellExecuteA
comctl32
ord17
ImageList_Draw
ImageList_GetImageInfo
ImageList_Destroy
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantClear
VariantInit
VariantChangeType
Sections
.text Size: 176KB - Virtual size: 173KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 174KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tc Size: 248KB - Virtual size: 248KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE