Static task
static1
Behavioral task
behavioral1
Sample
f45b4103c8af2089a83b7be125aad682d68e12c7bb0a6400a7bd5fdec497dc71.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f45b4103c8af2089a83b7be125aad682d68e12c7bb0a6400a7bd5fdec497dc71.exe
Resource
win10v2004-20220812-en
General
-
Target
f45b4103c8af2089a83b7be125aad682d68e12c7bb0a6400a7bd5fdec497dc71
-
Size
111KB
-
MD5
6a869267da9f9b0fd3bead86a0c4103a
-
SHA1
8494f28b46f3895e68095f78e3fa5d26b34a8ab5
-
SHA256
f45b4103c8af2089a83b7be125aad682d68e12c7bb0a6400a7bd5fdec497dc71
-
SHA512
adddf6234c1fa606b8dce8b9f0e5d8a85a702bd92d63e5657f606ac9ec06466664d318bda568e76c3a4ed7562a35074f653b785e3c36770876ababa071dc4d61
-
SSDEEP
1536:GjdXiqpbYBVz5Kiek7tE272jEaVIM/ay5edspZCA:K3FYn5KieKR8Z5edkd
Malware Config
Signatures
Files
-
f45b4103c8af2089a83b7be125aad682d68e12c7bb0a6400a7bd5fdec497dc71.exe windows x86
e377373d3e0bc6c16e456c588f962cb6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CreateCompatibleBitmap
SaveDC
user32
KillTimer
SetActiveWindow
SetClassLongA
GetClassInfoA
MessageBoxA
GetActiveWindow
GetScrollRange
FrameRect
ScrollWindow
SetParent
GetMenuItemCount
TrackPopupMenu
DestroyMenu
OemToCharA
DrawTextA
IsRectEmpty
GetCapture
GetDesktopWindow
GetWindowDC
DeleteMenu
UnregisterClassA
DefFrameProcA
ReleaseCapture
SetWindowPos
GetWindowThreadProcessId
GetClipboardData
SystemParametersInfoA
OffsetRect
SendMessageW
GetDCEx
IsWindowEnabled
GetSysColor
BeginPaint
FindWindowA
ChildWindowFromPoint
GetMenuState
SetCapture
PeekMessageW
PtInRect
LoadCursorA
DispatchMessageW
TranslateMessage
CreateIcon
GetFocus
DestroyWindow
IsIconic
ShowOwnedPopups
MsgWaitForMultipleObjects
ShowWindow
GetWindowLongW
MapVirtualKeyA
SetScrollInfo
GetWindowLongA
CallWindowProcA
SetClipboardData
PostQuitMessage
SetRect
CharLowerA
EqualRect
GetSubMenu
EnumThreadWindows
DrawAnimatedRects
UpdateWindow
DefWindowProcA
GetSystemMenu
GetMessagePos
ActivateKeyboardLayout
DispatchMessageA
GetParent
RegisterClassA
ShowScrollBar
CloseClipboard
CreateWindowExA
DrawFrameControl
GetMenuItemID
GetLastActivePopup
GetPropA
GetMenu
GetKeyNameTextA
GetSysColorBrush
GetMenuItemInfoA
CreateMenu
LoadIconA
SetScrollPos
PeekMessageA
PostMessageA
wsprintfA
IsChild
MapWindowPoints
GetIconInfo
FillRect
InflateRect
RemoveMenu
DrawEdge
DrawIcon
SetWindowTextA
GetKeyboardLayoutList
LoadBitmapA
GetClassNameA
GetScrollPos
MoveWindow
GetSystemMetrics
DrawMenuBar
RemovePropA
DestroyCursor
GetCursorPos
GetTopWindow
GetDlgItem
SetCursor
EnableWindow
CheckMenuItem
WindowFromPoint
GetClassLongA
AdjustWindowRectEx
GetForegroundWindow
ClientToScreen
SetMenu
EnumWindows
SetWindowLongW
UnhookWindowsHookEx
IsDialogMessageA
shlwapi
SHSetValueA
PathIsDirectoryA
PathGetCharTypeA
SHGetValueA
SHEnumValueA
PathIsContentTypeA
oleaut32
SafeArrayGetElement
OleLoadPicture
SysStringLen
SysAllocStringLen
comdlg32
GetOpenFileNameA
ChooseColorA
GetFileTitleA
GetSaveFileNameA
kernel32
GlobalFindAtomA
WriteFile
CreateFileA
GetModuleFileNameA
SetThreadLocale
GetEnvironmentStrings
SetLastError
lstrlenA
WideCharToMultiByte
GetStartupInfoA
ExitProcess
FreeResource
GetCurrentProcess
VirtualAlloc
GetCurrentThreadId
HeapDestroy
GetLocaleInfoA
InitializeCriticalSection
SetErrorMode
EnterCriticalSection
GetDateFormatA
GetFullPathNameA
SizeofResource
GetCPInfo
lstrcmpA
MulDiv
GetProcAddress
MoveFileExA
GetUserDefaultLCID
FreeLibrary
GetOEMCP
GetModuleHandleA
LocalFree
GlobalAddAtomA
SetFilePointer
GetVersionExA
SetEvent
CreateEventA
VirtualFree
HeapFree
GetLocalTime
VirtualAllocEx
GetFileType
lstrcmpiA
CompareStringA
GetCurrentProcessId
GetFileAttributesA
GetThreadLocale
RaiseException
GetStringTypeW
FindResourceA
GetProcessHeap
GetCurrentThread
GetACP
DeleteFileA
lstrcatA
WaitForSingleObject
GlobalAlloc
LoadLibraryA
LoadLibraryExA
GetVersion
HeapAlloc
shell32
Shell_NotifyIconA
SHGetFileInfoA
SHGetDesktopFolder
version
GetFileVersionInfoSizeA
msvcrt
strcmp
calloc
memmove
tan
Sections
.text Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: 1024B - Virtual size: 598B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE