Static task
static1
Behavioral task
behavioral1
Sample
c449994b5db1785b60ee874e7ad55681d96101979e27a31ccd4c7ca2ad526e3f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c449994b5db1785b60ee874e7ad55681d96101979e27a31ccd4c7ca2ad526e3f.exe
Resource
win10v2004-20220901-en
General
-
Target
c449994b5db1785b60ee874e7ad55681d96101979e27a31ccd4c7ca2ad526e3f
-
Size
482KB
-
MD5
82447e2bbc874f63b384dac9f458b610
-
SHA1
101a94e429a39462e1a139f378fa33bf1b6d0f5e
-
SHA256
c449994b5db1785b60ee874e7ad55681d96101979e27a31ccd4c7ca2ad526e3f
-
SHA512
937832f447eb959e05fe18d984448bd0b71ad52a4724a315854d4020c9bb7f3b204e3ed65c8ccc783d9fa3e0c61755353db8ee9747a8060d814bb91d1571bb56
-
SSDEEP
12288:+k47X9iByLNYFfgQ9PMaOcwABJh8Emam:2NLNcJ7qAPC
Malware Config
Signatures
Files
-
c449994b5db1785b60ee874e7ad55681d96101979e27a31ccd4c7ca2ad526e3f.exe windows x86
694acff0be4573cd346580045688649a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
InvalidateRect
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
SendMessageA
DefWindowProcA
AppendMenuA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
ShowWindow
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
shell32
SHGetSpecialFolderLocation
ShellExecuteA
SHGetFileInfoA
SHBrowseForFolderA
SHGetPathFromIDListA
SHFileOperationA
ole32
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
advapi32
RegEnumKeyA
RegCloseKey
RegDeleteValueA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
gdi32
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SetBkColor
comctl32
ImageList_Destroy
ImageList_Create
ImageList_AddMasked
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
GetACP
GetCPInfo
InitializeCriticalSectionAndSpinCount
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
QueryPerformanceCounter
HeapFree
VirtualFree
HeapCreate
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
DeleteCriticalSection
SetHandleCount
GetEnvironmentStringsW
LCMapStringA
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
GetOEMCP
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsValidCodePage
HeapAlloc
VirtualAlloc
HeapReAlloc
RtlUnwind
HeapSize
GetModuleHandleW
GetLocaleInfoA
WideCharToMultiByte
GetLogicalDrives
ExitProcess
GetWindowsDirectoryA
SetFileTime
SetErrorMode
CreateIoCompletionPort
FlushInstructionCache
GetProcessTimes
GetNamedPipeHandleStateW
GetCommandLineA
LocalUnlock
GetFileInformationByHandle
PulseEvent
IsWow64Process
ConvertFiberToThread
FindNextChangeNotification
GetCurrentThread
GetFileAttributesExW
FindFirstFileExW
GetProcessHeap
FreeResource
LocalShrink
GetCommTimeouts
GetCurrentProcessId
GetFileType
GetCommMask
EncodeSystemPointer
CreateTapePartition
SetMessageWaitingIndicator
GetMailslotInfo
GetCommandLineW
GetTempPathA
DeleteFileA
FindFirstFileA
FindNextFileA
FindClose
SetFilePointer
MulDiv
ReadFile
WriteFile
GetPrivateProfileStringA
WritePrivateProfileStringA
MultiByteToWideChar
FreeLibrary
GetProcAddress
LoadLibraryExA
GetModuleHandleA
GetExitCodeProcess
WaitForSingleObject
GlobalAlloc
GlobalFree
ExpandEnvironmentStringsA
lstrcmpA
lstrcmpiA
CloseHandle
GetVersion
GetSystemDirectoryA
lstrcatA
lstrlenA
GetTempFileNameA
CreateFileA
RemoveDirectoryA
CreateProcessA
CreateThread
GlobalLock
GlobalUnlock
GetDiskFreeSpaceA
lstrcpynA
LoadLibraryA
Sections
.text Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 363KB - Virtual size: 363KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ