Static task
static1
Behavioral task
behavioral1
Sample
4f4ec33c7f1645bebd98acb1f9dbb4dd00f38e0b975d3f7001a4f98a111e33b6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4f4ec33c7f1645bebd98acb1f9dbb4dd00f38e0b975d3f7001a4f98a111e33b6.exe
Resource
win10v2004-20220812-en
General
-
Target
4f4ec33c7f1645bebd98acb1f9dbb4dd00f38e0b975d3f7001a4f98a111e33b6
-
Size
312KB
-
MD5
7bb4ab65fe63d5e75c7034bce849fb41
-
SHA1
1f238d36b539d21745350af7ce752538ac60410f
-
SHA256
4f4ec33c7f1645bebd98acb1f9dbb4dd00f38e0b975d3f7001a4f98a111e33b6
-
SHA512
53cf9c3820ef845df4c5af9ed930df16670f68d941dbedb1dc0cc30828ffd34a2e46f4b0df9b639caeeb2f0e5cd2c4b9b9361018cdda7d6985e602dbe1b59971
-
SSDEEP
6144:JJRbv2rdDQv2hmzil+c2a/rGoCj497p8NNYuCYIhvj9viRVBZB4aF:9v2rdDQv2hTl+c2axkNYuxK4j
Malware Config
Signatures
Files
-
4f4ec33c7f1645bebd98acb1f9dbb4dd00f38e0b975d3f7001a4f98a111e33b6.exe windows x86
bf41d925d36d13907098e2174a7cfe5d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalSize
GetProcAddress
CreateFileMappingA
GlobalAlloc
IsValidLocale
GetCurrentThreadId
MapViewOfFile
GetVersion
GetStartupInfoA
GetModuleFileNameA
GetCommandLineA
CloseHandle
ExitProcess
GetProfileIntA
GlobalReAlloc
GetTimeZoneInformation
GetFileInformationByHandle
GetTempFileNameA
GetProfileStringA
GetPrivateProfileStringA
LoadLibraryA
GetCurrentDirectoryA
SearchPathA
WinExec
GetModuleHandleA
FreeLibrary
MulDiv
IsDBCSLeadByte
LocalSize
SetEndOfFile
lstrcpynA
SetFilePointer
SetErrorMode
_llseek
_lwrite
SetCurrentDirectoryA
_lcreat
GetLastError
GetUserDefaultLCID
_lread
GetTickCount
_lclose
LocalReAlloc
_lopen
FileTimeToLocalFileTime
GetSystemTime
SystemTimeToFileTime
Sleep
SetFileAttributesA
MoveFileA
VirtualAlloc
CopyFileA
CompareStringA
GetWindowsDirectoryA
VirtualFree
GetTempPathA
GetFileAttributesA
FindNextFileA
GetSystemDirectoryA
FindClose
lstrcmpiA
FindFirstFileA
lstrcatA
DeleteFileA
RtlZeroMemory
GlobalLock
lstrlenA
lstrcpyA
GlobalUnlock
GetFullPathNameA
LocalFree
GlobalFree
RtlMoveMemory
LocalAlloc
GetLogicalDrives
WideCharToMultiByte
MultiByteToWideChar
GetFileType
GetStdHandle
GetCPInfo
GetOEMCP
GetACP
UnhandledExceptionFilter
RtlUnwind
GetEnvironmentStrings
user32
CharNextA
CharPrevA
PtInRect
ShowScrollBar
UpdateWindow
FrameRect
InvalidateRgn
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
RegisterClassExA
LoadImageA
LoadIconA
RegisterWindowMessageA
LoadCursorA
LoadAcceleratorsA
PostQuitMessage
SetRectEmpty
IsRectEmpty
SystemParametersInfoA
EqualRect
TranslateAcceleratorA
SetMessageQueue
SetCapture
ChildWindowFromPoint
GetMessagePos
EndPaint
BeginPaint
InflateRect
ClientToScreen
SetCursor
GetSysColorBrush
EnumThreadWindows
KillTimer
ReleaseCapture
ScrollWindow
SetScrollPos
GetScrollPos
SetScrollRange
CopyRect
GetMenu
GetSubMenu
GetMenuItemCount
GetKeyState
GetCursorPos
CheckMenuItem
TrackPopupMenu
SetActiveWindow
SetTimer
FillRect
SetRect
InvertRect
CharLowerA
WinHelpA
GetClientRect
IsWindowEnabled
GetWindow
VkKeyScanA
GetClassNameA
DefWindowProcA
RegisterClassA
GetDesktopWindow
CreateWindowExA
UnregisterClassA
CharUpperA
FindWindowA
EnumWindows
CallWindowProcA
GetSystemMetrics
GetSysColor
DrawFocusRect
IsIconic
EndDialog
SendDlgItemMessageA
MessageBoxA
DialogBoxParamA
GetDlgItemTextA
SetDlgItemTextA
GetFocus
LoadBitmapA
ScreenToClient
GetDC
ReleaseDC
ValidateRect
IsDlgButtonChecked
CheckDlgButton
EnumChildWindows
GetWindowRect
InvalidateRect
OffsetRect
SetForegroundWindow
LoadStringA
GetMessageA
GetAsyncKeyState
IsWindow
DestroyWindow
wsprintfA
IsZoomed
ShowWindow
IsWindowVisible
MoveWindow
CreateDialogParamA
PeekMessageA
TranslateMessage
DispatchMessageA
IsDialogMessageA
GetWindowLongA
SetWindowLongA
SetWindowPos
EnableWindow
SendMessageA
GetDlgItem
SetWindowTextA
SetFocus
GetParent
PostMessageA
GetWindowTextA
EnableMenuItem
CreateMenu
InsertMenuA
DeleteMenu
DrawMenuBar
DestroyMenu
LoadMenuA
SetMenu
GetWindowTextLengthA
IsClipboardFormatAvailable
CreatePopupMenu
AppendMenuA
gdi32
DeleteDC
SelectObject
CreateCompatibleDC
GetObjectA
GetTextExtentPoint32A
SetBkColor
GetTextMetricsA
SetTextColor
GetStockObject
ExtTextOutA
PatBlt
SetPixel
BitBlt
GetDeviceCaps
DeleteMetaFile
CreateCompatibleBitmap
RealizePalette
SelectPalette
CreateDIBitmap
CreateBitmap
SetStretchBltMode
SetDIBits
CreateDiscardableBitmap
RestoreDC
CreateSolidBrush
SetViewportExtEx
SetWindowExtEx
PlayMetaFile
SetMapMode
SaveDC
SetViewportOrgEx
SetWindowOrgEx
CreatePalette
LPtoDP
SetMetaFileBitsEx
SetBkMode
CreateICA
SetROP2
DeleteObject
CreatePen
GetTextColor
SetTextAlign
GetBkColor
GetTextAlign
CreateFontIndirectA
TextOutA
Rectangle
LineTo
GetNearestColor
GetTextExtentPointA
InvertRgn
MoveToEx
SetRectRgn
CreateRectRgn
CombineRgn
IntersectClipRect
CreatePatternBrush
CreateFontA
UnrealizeObject
GetSystemPaletteEntries
SetBrushOrgEx
EndDoc
EndPage
CreateDCA
SetAbortProc
Escape
StartDocA
StretchBlt
StartPage
advapi32
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
Sections
.text Size: 220KB - Virtual size: 216KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ