Static task
static1
Behavioral task
behavioral1
Sample
5209ca779cf65ed81f508f3648c6ae2c98a8acdd665e82673652d05b71cfaa53.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5209ca779cf65ed81f508f3648c6ae2c98a8acdd665e82673652d05b71cfaa53.exe
Resource
win10v2004-20220901-en
General
-
Target
5209ca779cf65ed81f508f3648c6ae2c98a8acdd665e82673652d05b71cfaa53
-
Size
110KB
-
MD5
438d4fc46546a8707603dc74975b4780
-
SHA1
895cc43de3874972cf85f3fb9cb92d0b48c68e23
-
SHA256
5209ca779cf65ed81f508f3648c6ae2c98a8acdd665e82673652d05b71cfaa53
-
SHA512
83885b3c8ef41ed57cfa3fb762f4cd57553e4f8afebeb1dda7a011c75e963e3731356a019d79d32c60dcb9e754edf6ff3c87fd32798b3c0fed886baddf63a63b
-
SSDEEP
1536:SAm50IpAoljirZZyUbx1rbUw3+iZ1S/74kxX9DTjxEyefYA4:SjoZZ5bx1rq74kxkDfp4
Malware Config
Signatures
Files
-
5209ca779cf65ed81f508f3648c6ae2c98a8acdd665e82673652d05b71cfaa53.exe windows x86
fe15524970fe000009887570f2c47ec2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
FindWindowA
SendMessageW
GetMenuStringA
LoadIconA
GetClassNameA
GetDlgItem
EnumThreadWindows
EnableMenuItem
LoadKeyboardLayoutA
EnableWindow
CharUpperBuffA
OffsetRect
DrawEdge
wsprintfA
DrawMenuBar
GetSysColorBrush
UnregisterClassA
DestroyMenu
GetFocus
GetKeyState
CheckMenuItem
GetKeyboardLayoutList
GetSystemMetrics
IsDialogMessageA
SetWindowLongW
ReleaseCapture
GetDesktopWindow
RemovePropA
ReleaseDC
DestroyWindow
SetWindowPos
CharLowerA
ClientToScreen
SystemParametersInfoA
CreateWindowExA
ShowOwnedPopups
IsWindowUnicode
PeekMessageW
TranslateMessage
SetWindowPlacement
IntersectRect
SetScrollPos
AdjustWindowRectEx
ChildWindowFromPoint
GetSystemMenu
CharNextW
SetMenu
GetClipboardData
SetRect
IsWindow
PtInRect
RegisterClipboardFormatA
IsWindowEnabled
GetScrollPos
CharLowerBuffA
DefWindowProcA
LoadStringA
DefMDIChildProcA
CreatePopupMenu
RegisterClassA
SendMessageA
GetMenuItemID
GetSubMenu
SetWindowLongA
IsChild
RemoveMenu
DrawAnimatedRects
GetClassInfoA
GetMenuItemCount
GetWindowLongA
EmptyClipboard
IsRectEmpty
SetScrollInfo
GetCursorPos
DestroyCursor
GetCursor
CallNextHookEx
CreateMenu
OemToCharA
DrawIconEx
GetKeyboardType
SetClassLongA
GetDC
EqualRect
GetKeyboardLayoutNameA
GetPropA
SetCursor
DispatchMessageA
DrawIcon
SetScrollRange
GetClassLongA
ScreenToClient
ShowWindow
GetKeyNameTextA
DeleteMenu
MessageBeep
GetSysColor
GetWindowLongW
GetMenuState
GetWindowThreadProcessId
RedrawWindow
MsgWaitForMultipleObjects
GetTopWindow
UpdateWindow
EnableScrollBar
GetWindowTextA
IsDialogMessageW
EnumWindows
CallWindowProcA
WaitMessage
DrawTextA
IsZoomed
PostMessageA
SetParent
IsIconic
DispatchMessageW
GetMenu
GetIconInfo
GetWindowRect
TranslateMDISysAccel
GetLastActivePopup
MapVirtualKeyA
SetWindowsHookExA
GetClientRect
GetParent
SetForegroundWindow
UnhookWindowsHookEx
GetWindowPlacement
LoadBitmapA
MapWindowPoints
MessageBoxA
MoveWindow
SetWindowTextA
EnumChildWindows
InsertMenuItemA
DefFrameProcA
GetActiveWindow
CloseClipboard
GetMenuItemInfoA
KillTimer
SetPropA
BeginPaint
OpenClipboard
SetTimer
GetKeyboardLayout
EndPaint
InsertMenuA
GetDCEx
SetClipboardData
PostQuitMessage
GetScrollRange
GetCapture
TrackPopupMenu
GetScrollInfo
GetWindow
GetKeyboardState
GetWindowDC
InflateRect
SetCapture
SetMenuItemInfoA
CharToOemA
FrameRect
ActivateKeyboardLayout
RegisterWindowMessageA
IsWindowVisible
SetActiveWindow
ScrollWindow
SetFocus
InvalidateRect
CreateIcon
GetForegroundWindow
msvcrt
memmove
calloc
abs
sin
memcpy
kernel32
FreeResource
WaitForSingleObject
GetCPInfo
ResetEvent
GetLocalTime
GetCurrentThreadId
ExitThread
GlobalDeleteAtom
lstrlenA
GetACP
GetDiskFreeSpaceA
DeleteCriticalSection
RaiseException
LoadLibraryExA
SetEvent
MoveFileA
LoadLibraryA
LocalReAlloc
GetProcessHeap
GetStartupInfoA
GetModuleHandleA
Sleep
GetDateFormatA
GetEnvironmentStrings
FreeLibrary
HeapAlloc
DeleteFileA
MoveFileExA
GetModuleFileNameA
GetSystemDefaultLangID
GetFullPathNameA
SetFilePointer
EnumCalendarInfoA
GetStringTypeW
GetCurrentThread
HeapFree
GetFileAttributesA
VirtualFree
MulDiv
FormatMessageA
WriteFile
LoadResource
GetOEMCP
GetVersionExA
lstrcatA
GetLastError
SetLastError
GetStdHandle
HeapDestroy
ReadFile
GetThreadLocale
SetHandleCount
SetEndOfFile
GetCurrentProcess
GlobalAlloc
LocalFree
GetProcAddress
GetCurrentProcessId
GetFileSize
CreateFileA
GlobalAddAtomA
lstrcpynA
SetThreadLocale
GetTickCount
GetVersion
ExitProcess
GetLocaleInfoA
GlobalFindAtomA
VirtualAlloc
FindResourceA
SizeofResource
CreateEventA
lstrcmpA
lstrcpyA
GetUserDefaultLCID
LocalAlloc
CreateThread
SetErrorMode
FindFirstFileA
CompareStringA
lstrcmpiA
GetFileType
WideCharToMultiByte
GetStringTypeA
InitializeCriticalSection
GetCommandLineA
FindClose
VirtualQuery
Sections
CODE Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 729B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ