Static task
static1
Behavioral task
behavioral1
Sample
f31222d94f3a48df4ae4a90f1cf6d1e6ed0215eb59525c4123eff7f0131f67ef.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f31222d94f3a48df4ae4a90f1cf6d1e6ed0215eb59525c4123eff7f0131f67ef.exe
Resource
win10v2004-20220812-en
General
-
Target
f31222d94f3a48df4ae4a90f1cf6d1e6ed0215eb59525c4123eff7f0131f67ef
-
Size
176KB
-
MD5
6472c24c4a7447d47339d62ba6cb736b
-
SHA1
2189a6a5aa55533d619e65552be378f0a8d82616
-
SHA256
f31222d94f3a48df4ae4a90f1cf6d1e6ed0215eb59525c4123eff7f0131f67ef
-
SHA512
4a766e87ae4ed4543c3703e474ed95933285a9a336c0957ab60fc33b0da6c268627474157ab737b65ac559320d4f988e59b6b3a2ac4acc0492a620cb161d8e0c
-
SSDEEP
3072:vPgdDMSAhBxxKZVbdkJ75cEuV9Rig/Ini9xiZfjpuiPjcoDn:wdDMSm8sifVSmxA7pJT
Malware Config
Signatures
Files
-
f31222d94f3a48df4ae4a90f1cf6d1e6ed0215eb59525c4123eff7f0131f67ef.exe windows x86
63c64d834c9674e3beddff51a4a17c0d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetScrollInfo
GetMenuItemInfoA
GetPropA
GetScrollPos
GetSysColorBrush
GetWindowTextA
GetMenuState
GetCursor
GetMessagePos
IsWindowVisible
GetSysColor
GetScrollRange
GetParent
GetSubMenu
IsWindowEnabled
kernel32
EnterCriticalSection
GetLocaleInfoA
GetFileAttributesA
GetFullPathNameA
GetStdHandle
FormatMessageA
MoveFileA
LockResource
SetHandleCount
GetEnvironmentStrings
FreeResource
GetOEMCP
WriteFile
GetVersion
MulDiv
LoadLibraryExA
SetEndOfFile
VirtualAlloc
GetCurrentProcessId
RaiseException
lstrlenA
LoadLibraryA
VirtualFree
LocalFree
GetCurrentThreadId
FindFirstFileA
GlobalAlloc
ReadFile
GetLocalTime
GetProcAddress
GetLastError
GetFileType
CloseHandle
VirtualAllocEx
GetModuleHandleA
GetVersionExA
GetStringTypeW
LocalAlloc
GetModuleFileNameA
lstrcatA
ResetEvent
GetDateFormatA
DeleteFileA
MoveFileExA
GlobalFindAtomA
lstrcmpiA
GlobalDeleteAtom
HeapAlloc
ExitProcess
FindClose
GetACP
lstrcpynA
HeapFree
lstrcmpA
FindResourceA
VirtualQuery
GetCommandLineA
GetCurrentThread
ExitThread
SetLastError
SetFilePointer
LoadResource
lstrcpyA
LocalReAlloc
GetProcessHeap
InitializeCriticalSection
EnumCalendarInfoA
GetStartupInfoA
SetErrorMode
CreateEventA
SizeofResource
Sleep
GetFileSize
GetCurrentProcess
GetSystemDefaultLangID
DeleteCriticalSection
GlobalAddAtomA
CreateThread
HeapDestroy
CompareStringA
GetUserDefaultLCID
GetCPInfo
WaitForSingleObject
GetThreadLocale
SetThreadLocale
GetTickCount
GetDiskFreeSpaceA
msvcrt
memcpy
calloc
memmove
malloc
log10
Sections
CODE Size: 163KB - Virtual size: 163KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE