Static task
static1
Behavioral task
behavioral1
Sample
5f8f2555fe06b849b9912c44cad54067c268e2e0cf0dd54f835b59332779d840.exe
Resource
win7-20220812-en
General
-
Target
5f8f2555fe06b849b9912c44cad54067c268e2e0cf0dd54f835b59332779d840
-
Size
853KB
-
MD5
5138abd24b33f96486b8327e78ad5fe0
-
SHA1
6131949de84303f4ac79c9d2075390aac1f21422
-
SHA256
5f8f2555fe06b849b9912c44cad54067c268e2e0cf0dd54f835b59332779d840
-
SHA512
ff6e04dc3cb202ebed82656c5b915616d77cab302963ef623f8b09eddb0a41b696331e20acdd3df90055b454f117526e5ace3726d5b63f221f1a850f1d21ca46
-
SSDEEP
12288:yucNJCCKOu5mrMjzlnEJmf2aqtg+wOqpgc2q/MS6Z+aV0nJUVCrnjp:3cDCCKOu5mrSuJmOaqfwB/Q3CJUIj1
Malware Config
Signatures
Files
-
5f8f2555fe06b849b9912c44cad54067c268e2e0cf0dd54f835b59332779d840.exe windows x86
3af1bd48990ed610b12d2d7dfaa1a4d8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
SetupDefaultQueueCallbackA
SetupFindFirstLineA
SetupGetStringFieldA
SetupFindNextLine
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
winmm
waveOutOpen
waveOutClose
shell32
ShellExecuteExA
ord680
ShellExecuteA
crypt32
CertOpenStore
CertCloseStore
CertAddCertificateContextToStore
CertEnumCertificatesInStore
CertCompareCertificate
CertFreeCertificateContext
kernel32
LockFile
UnlockFile
FlushFileBuffers
SetEndOfFile
MoveFileA
GetVolumeInformationA
ReadFile
SetFilePointer
WriteFile
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GlobalFlags
TlsAlloc
GlobalHandle
TlsSetValue
GetCurrentThread
TlsFree
GetProcessVersion
GetCPInfo
GetOEMCP
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileAttributesA
GetFileSize
GetFileTime
SetErrorMode
GetCurrentDirectoryA
RtlUnwind
GlobalReAlloc
GetStartupInfoA
LocalReAlloc
GetCurrentProcess
RaiseException
CreateThread
TlsGetValue
DuplicateHandle
GetExitCodeProcess
HeapSize
GetTimeZoneInformation
GetACP
CompareStringA
CompareStringW
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
GetDriveTypeA
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
GetLocaleInfoA
GetLocaleInfoW
SetEnvironmentVariableA
ExitProcess
SuspendThread
FindFirstFileA
FindNextFileA
FindClose
DeleteFileA
RemoveDirectoryA
GetCurrentThreadId
LoadLibraryA
FreeLibrary
lstrcpynA
MulDiv
GlobalGetAtomNameA
SetThreadPriority
ResumeThread
GlobalFindAtomA
lstrcmpiA
GlobalAddAtomA
GlobalLock
GlobalDeleteAtom
GetModuleHandleA
WideCharToMultiByte
GlobalUnlock
LockResource
DeviceIoControl
InterlockedDecrement
InterlockedIncrement
ExitThread
WaitForMultipleObjects
GlobalFree
OpenProcess
TerminateProcess
CreateToolhelp32Snapshot
SetLastError
MultiByteToWideChar
WritePrivateProfileStringA
Process32First
Process32Next
SetStdHandle
GetTickCount
GetProcessHeap
CloseHandle
HeapAlloc
HeapFree
FindResourceA
SizeofResource
LoadResource
GetFullPathNameA
GetCommState
SetCommState
SetCommTimeouts
SetupComm
EscapeCommFunction
CreateFileA
GetTempPathA
GetCurrentProcessId
GlobalAlloc
OpenEventA
SetEvent
lstrlenA
LocalAlloc
LocalFree
GetVersionExA
GetSystemInfo
CreateProcessA
GetVersion
MoveFileExA
GetShortPathNameA
GetPrivateProfileSectionA
WritePrivateProfileSectionA
CopyFileA
GetFileAttributesExA
SetFileAttributesA
GetSystemDirectoryA
lstrcmpA
GetWindowsDirectoryA
GetProcAddress
Sleep
CreateEventA
WaitForSingleObject
GetModuleFileNameA
GetLastError
CreateDirectoryA
lstrcpyA
lstrcatA
GetFileType
HeapReAlloc
GetLocalTime
GetCommandLineA
user32
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
GetCursorPos
ValidateRect
TranslateMessage
GetMessageA
ClientToScreen
GetDC
ReleaseDC
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
CharUpperA
PostQuitMessage
SetCursor
GetClassNameA
PtInRect
LoadCursorA
GetSysColorBrush
DestroyMenu
EnableMenuItem
DispatchMessageA
AdjustWindowRectEx
CopyRect
IsWindowVisible
GetTopWindow
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgCtrlID
GetKeyState
DefWindowProcA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
RegisterWindowMessageA
GetWindowPlacement
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetParent
IsWindowEnabled
GetWindowRect
LoadIconA
ShowWindow
GetSystemMetrics
SetWindowPos
MessageBoxA
KillTimer
SetTimer
InvalidateRect
InflateRect
IsRectEmpty
GetClientRect
GetSysColor
wsprintfA
SendMessageA
EnableWindow
PostMessageA
LoadStringA
EnumWindows
GetWindowTextA
GetWindowThreadProcessId
GetFocus
SetWindowTextA
IsDialogMessageA
GetCapture
IsWindow
SetFocus
MapWindowPoints
UpdateWindow
SendDlgItemMessageA
WinHelpA
PeekMessageA
GetClassInfoA
SystemParametersInfoA
GetDlgItem
GetWindowLongA
IsIconic
UnregisterClassA
gdi32
CreatePen
GetClipBox
SetTextColor
SetBkColor
GetObjectA
CreateBitmap
DeleteDC
SaveDC
RestoreDC
SelectObject
GetStockObject
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteObject
CreateSolidBrush
GetDeviceCaps
GetViewportExtEx
GetWindowExtEx
PtVisible
TextOutA
ExtTextOutA
RectVisible
GetMapMode
Escape
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
Rectangle
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
AddAccessAllowedAce
RegEnumValueA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegQueryInfoKeyA
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
RegCloseKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetKeySecurity
FreeSid
RegEnumKeyA
RegOpenKeyExA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
comctl32
ord17
ole32
CoCreateInstance
CoInitialize
olepro32
ord251
Sections
.text Size: 552KB - Virtual size: 548KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 64KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 164KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE