Static task
static1
Behavioral task
behavioral1
Sample
5fc7df6d51e6e616f678b884b791a74bf0f10d1170b74c50a7dd3b1943432cb9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5fc7df6d51e6e616f678b884b791a74bf0f10d1170b74c50a7dd3b1943432cb9.exe
Resource
win10v2004-20220812-en
General
-
Target
5fc7df6d51e6e616f678b884b791a74bf0f10d1170b74c50a7dd3b1943432cb9
-
Size
704KB
-
MD5
a0990fe7f6b3ae626fa0a3444dd18e7d
-
SHA1
38f7e840a1fe4f9741a3d3cd74615a15973e4c07
-
SHA256
5fc7df6d51e6e616f678b884b791a74bf0f10d1170b74c50a7dd3b1943432cb9
-
SHA512
46ea5a1e1936a821c16a50c3a0969d20db872613219a22d1017a31342529f09e5375fa132e9e64f583387fd22d1c8f0ffa4e8a6335f2c167e5b99053e59072e6
-
SSDEEP
12288:eAP9GuPtiEcrEzPktNYPhhbx4yxDtJvgnNAbrfzrOZXJvB5yBbWX:NP8uPthcrIkEPf1/DtF8NAHEBie
Malware Config
Signatures
Files
-
5fc7df6d51e6e616f678b884b791a74bf0f10d1170b74c50a7dd3b1943432cb9.exe windows x86
007040932a199a7c345f942ca5c4ffe5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DestroyWindow
DestroyIcon
RegisterClassExA
RegisterClassA
LoadStringA
MessageBoxA
LoadIconA
CreateWindowExA
DefWindowProcA
LoadBitmapA
ShowWindow
oleaut32
LoadTypeLi
version
GetFileVersionInfoA
VerQueryValueA
ole32
StgCreateDocfileOnILockBytes
ReleaseStgMedium
CLSIDFromString
CreateFileMoniker
CreateStreamOnHGlobal
CoTaskMemAlloc
CoRevokeClassObject
CreateILockBytesOnHGlobal
CoInitializeSecurity
CoCreateInstance
RevokeDragDrop
CreateGenericComposite
gdi32
ScaleWindowExtEx
BitBlt
CreateRectRgn
CombineRgn
Polyline
CreateDIBitmap
DeleteObject
ScaleViewportExtEx
shell32
DragQueryFileA
SHGetDesktopFolder
SHGetSpecialFolderLocation
SHChangeNotify
SHGetFileInfoA
ord155
SHAppBarMessage
ShellExecuteA
SHGetPathFromIDListA
ExtractIconA
Shell_NotifyIconA
comctl32
ImageList_Destroy
ImageList_Remove
kernel32
GetModuleFileNameA
UnhandledExceptionFilter
GetLastError
GetStartupInfoA
GetProcAddress
GetSystemTimeAsFileTime
GetCurrentProcess
VirtualAlloc
EnterCriticalSection
ReadFile
SetEnvironmentVariableA
GetFileType
WriteFile
TlsAlloc
GetOEMCP
GetEnvironmentStringsW
InterlockedDecrement
InterlockedIncrement
CompareStringA
HeapDestroy
GetEnvironmentStrings
GetACP
HeapAlloc
GetModuleHandleA
TerminateProcess
GetLocalTime
GetTimeZoneInformation
GetCommandLineA
GetStringTypeA
FlushFileBuffers
ExitProcess
MultiByteToWideChar
InterlockedExchange
QueryPerformanceCounter
LeaveCriticalSection
FreeEnvironmentStringsW
HeapFree
GetCurrentThreadId
RaiseException
InitializeCriticalSection
CompareStringW
SetUnhandledExceptionFilter
GetCPInfo
VirtualQuery
GetSystemTime
RtlUnwind
LCMapStringW
SetFilePointer
HeapCreate
GetVersion
VirtualFree
TlsGetValue
GetStringTypeW
HeapReAlloc
SetStdHandle
LoadLibraryA
TlsSetValue
GetStdHandle
CreateMutexA
GetTickCount
GetCurrentProcessId
IsBadCodePtr
WideCharToMultiByte
SetHandleCount
DeleteCriticalSection
LCMapStringA
SetLastError
CloseHandle
FreeEnvironmentStringsA
advapi32
StartServiceCtrlDispatcherA
RegQueryValueExA
DeleteService
RegEnumValueA
RegQueryInfoKeyA
RegCreateKeyExA
Sections
.text Size: 76KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 464KB - Virtual size: 461KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ