Static task
static1
Behavioral task
behavioral1
Sample
22eeeee0b8b93e135138a964792cb8c6ca93f369dd9e74c7dfe8b735fc7d3b2e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
22eeeee0b8b93e135138a964792cb8c6ca93f369dd9e74c7dfe8b735fc7d3b2e.exe
Resource
win10v2004-20220812-en
General
-
Target
22eeeee0b8b93e135138a964792cb8c6ca93f369dd9e74c7dfe8b735fc7d3b2e
-
Size
188KB
-
MD5
7c224a522c57d3bf8ef04b710a048f31
-
SHA1
570f8abb105fda6142e3612bb5f09556c6bde563
-
SHA256
22eeeee0b8b93e135138a964792cb8c6ca93f369dd9e74c7dfe8b735fc7d3b2e
-
SHA512
f0a7f682a33ad5320e2bf3ba69ca83b68a246be4e20daa0bfd105021b3e1a8d210a6bc375094447ef74a51ab49d484dac1f5b58a7c32c47240dff38a0f7038fb
-
SSDEEP
3072:35ldleSiijof0OZ/lnxQAc7rYeqFftRYzoI7h+aS1Ga:3pleSuf0OZ9nxQS1Yzo0naGa
Malware Config
Signatures
Files
-
22eeeee0b8b93e135138a964792cb8c6ca93f369dd9e74c7dfe8b735fc7d3b2e.exe windows x86
5fd651ba3b3f2080f8c2d9f10e6ca8d3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
HeapReAlloc
HeapAlloc
VirtualAlloc
HeapFree
GetCommandLineA
GetProcessHeap
RtlUnwind
RaiseException
HeapSize
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
Sleep
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetCurrentProcess
FlushFileBuffers
SetFilePointer
WriteFile
GetOEMCP
GetCPInfo
GetLocaleInfoA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
lstrcmpW
GetVersionExA
GetCurrentThreadId
CloseHandle
GlobalFlags
GetThreadLocale
lstrcmpA
GlobalGetAtomNameA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
FreeLibrary
InterlockedDecrement
InterlockedIncrement
GetModuleHandleA
GetProcAddress
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
FindResourceA
LoadResource
LockResource
SizeofResource
GetModuleFileNameA
CompareStringA
InterlockedExchange
GetVersion
lstrlenA
GetLastError
MultiByteToWideChar
GetStdHandle
WideCharToMultiByte
user32
DestroyMenu
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
PostQuitMessage
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
IsIconic
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
SetWindowPos
SetWindowLongA
IsWindow
GetDlgItem
GetSubMenu
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
GetKeyState
PeekMessageA
ValidateRect
UnregisterClassA
GetFocus
GetMenuItemCount
GetMenuItemID
GetMenuState
GetSysColorBrush
GetSysColor
ReleaseDC
GetDC
GetSystemMetrics
LoadCursorA
UnhookWindowsHookEx
MessageBoxA
EnableWindow
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
GetWindowTextA
GetWindowThreadProcessId
SendMessageA
GetParent
GetWindowPlacement
gdi32
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
SetMapMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
DeleteObject
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
shell32
ShellExecuteA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 108KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ