Static task
static1
Behavioral task
behavioral1
Sample
4d052fb1a02a3eb343282909d59034c981d35e1d3ca7aa59e1d04917411698e4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4d052fb1a02a3eb343282909d59034c981d35e1d3ca7aa59e1d04917411698e4.exe
Resource
win10v2004-20220812-en
General
-
Target
4d052fb1a02a3eb343282909d59034c981d35e1d3ca7aa59e1d04917411698e4
-
Size
417KB
-
MD5
a17c6e8244bd176b59a2e78e9df74f60
-
SHA1
6da16046f97ae899f93725808e9ad0af428b814c
-
SHA256
4d052fb1a02a3eb343282909d59034c981d35e1d3ca7aa59e1d04917411698e4
-
SHA512
0abdec96d097536ab411bb86f5256bf50c0f9d4893de7c0c57a036846b574294cbc0ffb7ad0199e2e9afe4cfdd29ab812b6f15b76183fe73df294729a30dd86e
-
SSDEEP
6144:XyohGbFcCNhKIZus/NP9OXGKjpMgISGlY+YE0oLf0Rdni6k/ZoQACLs/NR:XyohGbFcCNhKIHF4Vu1LY+oLi6k/qCUj
Malware Config
Signatures
Files
-
4d052fb1a02a3eb343282909d59034c981d35e1d3ca7aa59e1d04917411698e4.exe windows x86
49394e2be33e88ae7214790318db86a2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
IsDlgButtonChecked
GetClipboardFormatNameW
TabbedTextOutA
FrameRect
IsWindowUnicode
InvertRect
GetTitleBarInfo
GetSystemMetrics
comdlg32
GetSaveFileNameA
GetOpenFileNameA
advapi32
RegQueryInfoKeyA
gdi32
SetTextColor
GetBkColor
AngleArc
SetSystemPaletteUse
GetMetaRgn
GdiGradientFill
CopyMetaFileW
GetBkMode
GetGlyphOutlineW
MoveToEx
SelectObject
CreateFontIndirectA
GetDeviceCaps
SetBkMode
DeleteObject
dbghelp
ImageRvaToSection
ImageNtHeader
ImageRvaToVa
comctl32
ImageList_Create
ImageList_Destroy
InitCommonControlsEx
ImageList_Remove
ImageList_Add
ImageList_ReplaceIcon
winspool.drv
DocumentPropertiesW
kernel32
GetLocaleInfoA
HeapSize
GetFileAttributesA
GetStringTypeW
GetStringTypeA
ClearCommError
VirtualAlloc
PeekNamedPipe
CreateFileA
SetPriorityClass
EndUpdateResourceW
GetEnvironmentStringsW
SetFileTime
GetPrivateProfileSectionW
lstrcpyA
GetCommandLineA
FindFirstFileA
MulDiv
Sleep
ReadFile
GetCurrentProcessId
WriteProcessMemory
GetProcAddress
GetModuleHandleA
ReadProcessMemory
OpenProcess
CloseHandle
SetThreadPriority
SetCurrentDirectoryA
ExitProcess
VirtualLock
VirtualUnlock
GetPrivateProfileStringA
WritePrivateProfileStringA
SetEndOfFile
CreateFileMappingA
MapViewOfFile
CopyFileA
WaitForSingleObject
CreatePipe
GetStartupInfoA
UnmapViewOfFile
GetCurrentDirectoryA
WritePrivateProfileStructA
GetPrivateProfileStructA
lstrcmpA
VirtualQueryEx
GetTempPathA
DeleteFileA
GetFileSize
GetPriorityClass
ResumeThread
GetModuleFileNameA
OutputDebugStringA
GetCurrentThread
lstrcmpiA
IsBadReadPtr
VirtualFree
SetFilePointer
LoadLibraryA
FindNextFileA
FindClose
WriteFile
VirtualProtectEx
TerminateProcess
GetCurrentProcess
GlobalAlloc
GlobalLock
GlobalUnlock
GetVersion
lstrlenW
WideCharToMultiByte
lstrlenA
lstrcatA
lstrcpynA
CreateProcessA
SetFileAttributesA
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
GetLastError
GetConsoleCP
GetConsoleMode
FlushFileBuffers
DeleteCriticalSection
SetHandleCount
GetStdHandle
GetFileType
HeapFree
GetModuleHandleW
SetUnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
UnhandledExceptionFilter
IsDebuggerPresent
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
SetStdHandle
InitializeCriticalSectionAndSpinCount
RtlUnwind
HeapAlloc
HeapReAlloc
LCMapStringA
LCMapStringW
Sections
.text Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 258KB - Virtual size: 257KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ