Static task
static1
Behavioral task
behavioral1
Sample
1204fc9df64ec0d73bd12fb972be545cd98178624f8644c12c9e08658950dce5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1204fc9df64ec0d73bd12fb972be545cd98178624f8644c12c9e08658950dce5.exe
Resource
win10v2004-20220812-en
General
-
Target
1204fc9df64ec0d73bd12fb972be545cd98178624f8644c12c9e08658950dce5
-
Size
397KB
-
MD5
49de1de30ff8f12f69b0ae035d826821
-
SHA1
bdcfe97e12317bd5c15c0a274577e7faf3bfd81c
-
SHA256
1204fc9df64ec0d73bd12fb972be545cd98178624f8644c12c9e08658950dce5
-
SHA512
32277305c3bc742e089e2e0f2c6a6ed0d328e3f74ac3e520834731f9b8da4fb83201d0422aa57a32580081204e3c70a156e03809de06e8727947f85250070809
-
SSDEEP
6144:EsRkTC6zX+UoEgE6KH7FXQ37zXNddYU2ybeV105ai4JTz3:zRkT7zXCEgE6Kbtc/Xoyqeshtb
Malware Config
Signatures
Files
-
1204fc9df64ec0d73bd12fb972be545cd98178624f8644c12c9e08658950dce5.exe windows x86
5935147b104b6a14af92378fe8a4f4b9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegEnumValueA
GetFileSecurityA
RegSetValueExA
RegOpenKeyA
RegCreateKeyA
RegCreateKeyExA
SetFileSecurityA
RegQueryValueExA
RegDeleteKeyA
RegEnumKeyExA
RegEnumKeyA
InitializeSecurityDescriptor
GetUserNameA
RegSetValueA
RegCloseKey
SetSecurityDescriptorDacl
RegQueryValueA
OpenProcessToken
RegOpenKeyExA
RegQueryInfoKeyA
RegDeleteValueA
shlwapi
PathIsRootW
PathCompactPathW
PathIsFileSpecW
StrFormatKBSizeW
winmm
timeKillEvent
waveOutWrite
waveInPrepareHeader
waveInOpen
waveInAddBuffer
mixerOpen
waveOutGetDevCapsA
waveOutPrepareHeader
mixerClose
waveInStart
mixerSetControlDetails
mmioClose
mixerGetControlDetailsA
waveOutClose
mixerGetNumDevs
waveInClose
waveOutGetNumDevs
mmioAscend
waveOutUnprepareHeader
waveInGetNumDevs
waveInUnprepareHeader
mixerGetLineControlsA
mixerGetDevCapsA
waveInStop
timeGetTime
timeSetEvent
PlaySoundA
waveInReset
waveOutOpen
mmioOpenA
timeBeginPeriod
mixerGetLineInfoA
gdi32
CreateRectRgn
GetGlyphOutlineA
CreateICA
PlayMetaFileRecord
SetWindowExtEx
AbortDoc
InvertRgn
EndPath
SelectClipRgn
DeleteMetaFile
ExcludeClipRect
GetWindowExtEx
PolyPolyline
GetCharABCWidthsA
SetPolyFillMode
CreateDIBPatternBrushPt
StartDocA
DPtoLP
PtVisible
SetColorAdjustment
ResizePalette
SetWindowOrgEx
OffsetWindowOrgEx
GetCurrentPositionEx
ArcTo
GetPolyFillMode
GetBoundsRect
GetArcDirection
EnumMetaFile
PolyBezierTo
GetStretchBltMode
GetOutlineTextMetricsA
EndDoc
CreateFontA
Chord
SetBkColor
EndPage
GetClipBox
CloseMetaFile
SetTextJustification
SelectPalette
BitBlt
FlattenPath
Ellipse
FloodFill
CreateMetaFileA
GetTextCharacterExtra
CreateRectRgnIndirect
MaskBlt
CreateEllipticRgn
SetMapperFlags
GetTextExtentPoint32A
LPtoDP
GetBitmapBits
BeginPath
PathToRegion
GetRgnBox
DeleteObject
GetStockObject
GetClipRgn
StretchBlt
StretchDIBits
StartPage
SaveDC
CreateBitmap
CreatePenIndirect
GetPixel
SetTextAlign
GetTextMetricsA
PolyBezier
Pie
RestoreDC
GetBkMode
Escape
GetPath
TextOutA
PolyDraw
user32
MoveWindow
EnableMenuItem
GetDlgCtrlID
InsertMenuW
RegisterClassExW
SendMessageW
RegisterClassW
GetCursorPos
CreatePopupMenu
LoadAcceleratorsW
LoadBitmapW
DefWindowProcW
LoadStringW
DeleteMenu
MessageBoxW
TabbedTextOutW
DrawIconEx
CopyIcon
GetKeyState
EnumWindows
PeekMessageW
SetCursorPos
UnhookWindowsHookEx
SetMenuItemBitmaps
GetFocus
CreateWindowExW
GetClassInfoExW
SetWindowPos
GetPropW
GetWindowThreadProcessId
GetClientRect
IsDialogMessageW
RemovePropW
GetParent
GetForegroundWindow
DrawTextW
GetSystemMetrics
CloseClipboard
GetSubMenu
GetSysColor
SetPropW
SetMenuItemInfoW
GetNextDlgTabItem
GetDlgItemInt
ScreenToClient
CopyImage
DestroyWindow
GrayStringW
ShowWindow
ModifyMenuW
GetClassNameW
InsertMenuItemW
comctl32
ImageList_GetIconSize
ord17
ImageList_Destroy
_TrackMouseEvent
ImageList_DrawEx
ImageList_Remove
PropertySheetW
InitCommonControlsEx
ImageList_AddMasked
ImageList_GetImageCount
DestroyPropertySheetPage
ImageList_Create
ImageList_ReplaceIcon
ImageList_GetImageInfo
CreatePropertySheetPageW
ImageList_Draw
ImageList_GetIcon
kernel32
VirtualProtect
FreeEnvironmentStringsW
IsBadWritePtr
GetStdHandle
GetCurrentProcessId
LeaveCriticalSection
InterlockedExchange
GetModuleHandleW
GetModuleFileNameW
SetHandleCount
GetFileType
HeapDestroy
OutputDebugStringA
GetLastError
CompareStringA
GetProcAddress
WriteFile
HeapReAlloc
HeapValidate
GetModuleHandleA
RaiseException
TlsAlloc
EnterCriticalSection
QueryPerformanceCounter
RtlUnwind
FlushFileBuffers
LCMapStringW
GetDateFormatA
GetCommandLineW
LCMapStringA
GetModuleFileNameA
DebugBreak
GetStringTypeW
GetTickCount
GetSystemInfo
InterlockedDecrement
GetCPInfo
IsBadCodePtr
GetStartupInfoA
VirtualQuery
TlsGetValue
SetEnvironmentVariableA
GetCurrentThreadId
IsBadReadPtr
GetTimeFormatA
WideCharToMultiByte
VirtualAlloc
UnhandledExceptionFilter
TlsFree
GetSystemTimeAsFileTime
GetCommandLineA
MultiByteToWideChar
SetFilePointer
LoadLibraryW
GetVersionExA
SetUnhandledExceptionFilter
SetLastError
VirtualFree
TerminateProcess
GetEnvironmentStrings
CreateMutexW
CloseHandle
GetStringTypeA
TlsSetValue
GetOEMCP
HeapFree
GetCurrentProcess
InterlockedIncrement
ExitProcess
FreeEnvironmentStringsA
HeapAlloc
LoadLibraryA
GetTimeZoneInformation
HeapCreate
ReadFile
GetLocaleInfoA
GetStartupInfoW
DeleteCriticalSection
SetStdHandle
GetEnvironmentStringsW
CompareStringW
GetACP
InitializeCriticalSection
Sections
.text Size: 113KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 63KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 118KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ