Static task
static1
Behavioral task
behavioral1
Sample
547757c0f1ee93dfc25dcc5c5e63a619bfba6c509e9358b5f423a177f978f86d.exe
Resource
win7-20220812-en
General
-
Target
547757c0f1ee93dfc25dcc5c5e63a619bfba6c509e9358b5f423a177f978f86d
-
Size
314KB
-
MD5
1ba8e7222b69fbda692aa3d8b9edf6d0
-
SHA1
9262d6aa090b4c9f1ace38f502cdb97219b455ae
-
SHA256
547757c0f1ee93dfc25dcc5c5e63a619bfba6c509e9358b5f423a177f978f86d
-
SHA512
e723b2488ed5a3aa58805dc3342303f93b9863c330632fbd7f178d63e6fbbe71093b98eed9ecde5b311b2095799044d4c9292408393b896755e80b88788da592
-
SSDEEP
6144:R1BmSDgFaHd/mn10GNIP40k/1ooWIzMl1gv26tm0aIA6Y3:P4aHs0X6do9s/tm0aI
Malware Config
Signatures
Files
-
547757c0f1ee93dfc25dcc5c5e63a619bfba6c509e9358b5f423a177f978f86d.exe windows x86
17fe767e2fc3cc92fe61e59fd44e1852
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVolumeInformationA
GetFullPathNameA
GetModuleFileNameA
lstrcmpA
FindNextFileA
GetModuleHandleA
InterlockedIncrement
InterlockedDecrement
GetCurrentProcessId
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
GlobalGetAtomNameA
GlobalFlags
GetCurrentThreadId
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GetCurrentProcess
GetLocaleInfoA
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
SetEnvironmentVariableA
SetCurrentDirectoryA
HeapAlloc
HeapFree
HeapReAlloc
VirtualAlloc
GetProcessHeap
GetStartupInfoA
SetStdHandle
GetFileType
HeapSize
ExitProcess
GetACP
IsValidCodePage
SetHandleCount
GetStdHandle
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
VirtualFree
HeapDestroy
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetDriveTypeA
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
GetFileTime
GetFileSize
GetFileAttributesA
CreateFileA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToSystemTime
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
CompareStringW
CompareStringA
GetVersion
MultiByteToWideChar
InterlockedExchange
GetCommandLineA
FreeLibrary
Sleep
LoadLibraryA
GetProcAddress
ExpandEnvironmentStringsA
GetWindowsDirectoryA
GetLocalTime
CreateProcessA
CloseHandle
WaitForSingleObject
GetExitCodeProcess
GetLastError
GetVersionExA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GlobalAddAtomA
lstrlenA
user32
CheckMenuItem
EnableMenuItem
ModifyMenuA
LoadBitmapA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
DestroyMenu
PostQuitMessage
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
IsIconic
GetWindowPlacement
RegisterWindowMessageA
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetWindowPos
SetWindowLongA
IsWindow
GetDlgItem
SetWindowsHookExA
DispatchMessageA
GetKeyState
PeekMessageA
ValidateRect
UnregisterClassA
GetFocus
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
MessageBoxA
CharUpperA
SetWindowTextA
GetWindowTextA
GetWindowThreadProcessId
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
UnhookWindowsHookEx
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetSystemMetrics
CallNextHookEx
advapi32
RegQueryValueExA
RegEnumKeyExA
RegCloseKey
RegOpenKeyExA
shell32
SHCreateDirectoryExA
oleacc
LresultFromObject
CreateStdAccessibleObject
shlwapi
PathStripToRootA
PathIsUNCA
PathFindFileNameA
gdi32
DeleteDC
CreateBitmap
GetStockObject
Escape
DeleteObject
SaveDC
SetBkColor
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
SetTextColor
SetMapMode
GetClipBox
OffsetViewportOrgEx
SetViewportOrgEx
RestoreDC
GetDeviceCaps
ExtTextOutA
TextOutA
RectVisible
PtVisible
SelectObject
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
comdlg32
GetFileTitleA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 156KB - Virtual size: 155KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE