Static task
static1
Behavioral task
behavioral1
Sample
c449616975ed581142a339e9eb141c82d3c8a26457f6aac5db890ed025e70c56.exe
Resource
win7-20220812-en
General
-
Target
c449616975ed581142a339e9eb141c82d3c8a26457f6aac5db890ed025e70c56
-
Size
200KB
-
MD5
09bcc1e6355a0e49c7ea1d21fa8028b0
-
SHA1
c5e71c4943e173fa8a86f58f7177087d31723378
-
SHA256
c449616975ed581142a339e9eb141c82d3c8a26457f6aac5db890ed025e70c56
-
SHA512
608e0b709466603b367ce36543157df37d920897ff8e2125f33ad52cca9aec8ad025035a57b56a98de0b6e13adfa9eb6660138fe8be267df552287805531586e
-
SSDEEP
3072:XLEHx04wk0AJlloXFLMRV4my7osCFR+NXgw5GDpgGBTvo9+9jHaHHf:8YxAJoFLM5RlSGBTvo9sjC
Malware Config
Signatures
Files
-
c449616975ed581142a339e9eb141c82d3c8a26457f6aac5db890ed025e70c56.exe windows x86
dace31d301a9f219042a345961e4c49b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetErrorMode
RtlUnwind
GetStartupInfoA
GetCommandLineA
ExitProcess
TerminateProcess
RaiseException
HeapSize
GetACP
GetTimeZoneInformation
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
GetDriveTypeA
GetStringTypeA
GetStringTypeW
Sleep
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetFileTime
GetFileSize
GetFileAttributesA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetOEMCP
GetCPInfo
GetProcessVersion
GetCurrentDirectoryA
WritePrivateProfileStringA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
InterlockedExchange
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
GetFullPathNameA
GetVolumeInformationA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
GetCurrentProcess
DuplicateHandle
lstrcpynA
FindNextFileA
FindFirstFileA
GetLastError
FindClose
MulDiv
SetLastError
LoadLibraryA
FreeLibrary
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcpyA
CreateThread
GetModuleHandleA
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
lstrlenA
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
HeapReAlloc
GetProcessHeap
HeapAlloc
HeapFree
WaitForMultipleObjects
GetSystemDirectoryA
MoveFileExA
GetTempPathA
DeleteFileA
CreateFileA
ReadFile
CloseHandle
GetPrivateProfileStringA
SetEvent
WaitForSingleObject
CreateEventA
GetFileType
user32
SetDlgItemTextA
IsDialogMessageA
SetWindowTextA
ShowWindow
ClientToScreen
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
CharUpperA
LoadCursorA
PtInRect
GetSysColorBrush
LoadStringA
DestroyMenu
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenuItemCount
GetSubMenu
GetMenuItemID
SendDlgItemMessageA
GetWindowTextA
GetDlgCtrlID
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
CopyRect
GetDC
ReleaseDC
EndDialog
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetMenu
UpdateWindow
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
SetCursor
EnableWindow
wsprintfA
EnumWindows
GetClassNameA
GetWindowThreadProcessId
PostQuitMessage
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
PostMessageA
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
SendMessageA
LoadIconA
RegisterWindowMessageA
UnregisterClassA
gdi32
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteObject
SetMapMode
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegEnumKeyExA
RegOpenKeyExA
RegDeleteKeyA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
shell32
ShellExecuteExA
ShellExecuteA
SHGetSpecialFolderPathA
comctl32
ord17
shlwapi
PathFileExistsA
PathAppendA
Sections
.text Size: 80KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rmnet Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE