Static task
static1
Behavioral task
behavioral1
Sample
73bc54f6850a0dea828e27164c63b4741b5bd409204b3a85ecc8c54f1431bc64.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
73bc54f6850a0dea828e27164c63b4741b5bd409204b3a85ecc8c54f1431bc64.exe
Resource
win10v2004-20220901-en
General
-
Target
73bc54f6850a0dea828e27164c63b4741b5bd409204b3a85ecc8c54f1431bc64
-
Size
315KB
-
MD5
801129b5b2da9f93d788b7ab649880d0
-
SHA1
4935aad4387dd86fbf50d7082d362707105d141d
-
SHA256
73bc54f6850a0dea828e27164c63b4741b5bd409204b3a85ecc8c54f1431bc64
-
SHA512
ba55ed6ae86604c1dc2b6e3da2c7013fda308decb3a12da6fec7c2c183d62d18b64039d335b38550d7772e5749cfc46694083b4cb8e922bea88e6aad3e790fa9
-
SSDEEP
6144:K8fRewe3UFrQ/GP0dUWxNKOyUg/lPRhmSsQLH5Aak:K8fR8kFrQyaUWxgFmSsPak
Malware Config
Signatures
Files
-
73bc54f6850a0dea828e27164c63b4741b5bd409204b3a85ecc8c54f1431bc64.exe windows x86
c8779cd07bdb4d5416eb287f56fa7cd1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
CreateFileMappingA
LoadLibraryExA
GetCurrentDirectoryA
TerminateProcess
GlobalLock
GlobalAlloc
GlobalUnlock
VirtualProtectEx
WriteProcessMemory
FormatMessageA
LocalFree
OpenFile
SetLastError
GetWindowsDirectoryA
WideCharToMultiByte
QueryDosDeviceW
MultiByteToWideChar
WaitForSingleObject
VirtualProtect
DuplicateHandle
GetLocalTime
WriteFile
CreateDirectoryA
OutputDebugStringA
GetLocaleInfoW
InterlockedExchange
ReadFile
SetStdHandle
VirtualQuery
GetSystemInfo
IsBadCodePtr
IsBadReadPtr
VirtualAlloc
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
SetUnhandledExceptionFilter
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
SetFilePointer
HeapSize
GetStringTypeW
GetStringTypeA
FlushFileBuffers
IsBadWritePtr
HeapReAlloc
HeapCreate
HeapDestroy
GetOEMCP
GetACP
HeapAlloc
LCMapStringW
LCMapStringA
RaiseException
RtlUnwind
GetCPInfo
ExitProcess
GetCommandLineA
GetStartupInfoA
HeapFree
ReadProcessMemory
VirtualFree
UnmapViewOfFile
MapViewOfFile
CreateFileA
GetThreadContext
GetCurrentProcessId
CloseHandle
GetVersionExA
FindNextFileA
SetEndOfFile
GetModuleFileNameA
LoadLibraryA
FindClose
SearchPathA
GetProcAddress
GetLastError
FindFirstFileA
SetCurrentDirectoryA
GetModuleFileNameW
CreateProcessA
OpenProcess
GetUserDefaultLCID
GetCurrentProcess
FreeLibrary
GetModuleHandleA
IsValidCodePage
user32
GetSystemMenu
RegisterClassExA
TrackPopupMenu
GetMenuItemID
LoadBitmapA
DefWindowProcA
SetMenuDefaultItem
EnableWindow
LoadCursorA
CreateWindowExA
SetWindowPos
GetWindowDC
IsDlgButtonChecked
CheckRadioButton
SetWindowTextA
CloseClipboard
EmptyClipboard
OpenClipboard
SetClipboardData
LoadMenuA
LoadIconA
TrackPopupMenuEx
GetCursorPos
DestroyMenu
IsIconic
KillTimer
SetFocus
IsWindow
InsertMenuA
IsWindowVisible
GetClassLongA
SetTimer
EnableMenuItem
SetMenuItemInfoA
GetMessageA
PostQuitMessage
TranslateMessage
MessageBoxA
DispatchMessageA
GetClassNameA
EnumWindows
GetWindowThreadProcessId
DestroyWindow
SetForegroundWindow
EndDialog
ShowWindow
PostMessageA
DialogBoxParamA
ClientToScreen
SetCursor
ScreenToClient
FillRect
SetCapture
DrawTextA
LoadStringA
GetParent
RemovePropA
WindowFromPoint
GetClientRect
SendMessageA
GetIconInfo
GetCapture
DrawFocusRect
InflateRect
DrawStateA
OffsetRect
InvalidateRect
GetWindowLongA
GetDlgItem
RedrawWindow
DestroyCursor
GetSysColor
FrameRect
GetActiveWindow
ReleaseCapture
LoadImageA
GetDlgCtrlID
DestroyIcon
GetWindowRect
GetPropA
GetDC
GetWindowTextA
SetPropA
SetWindowLongA
ReleaseDC
GetSystemMetrics
CallWindowProcA
GetSubMenu
gdi32
BitBlt
LineTo
SetBkMode
GetStockObject
CreatePatternBrush
SetTextColor
DeleteDC
SetBkColor
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
CreatePen
CreateSolidBrush
MoveToEx
GetTextExtentPoint32A
comdlg32
GetOpenFileNameA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
shell32
DragAcceptFiles
DragQueryFileA
Shell_NotifyIconA
ShellExecuteA
DragFinish
oleaut32
OleLoadPicturePath
comctl32
ImageList_Create
PropertySheetA
InitCommonControlsEx
ImageList_ReplaceIcon
ImageList_Destroy
Sections
.text Size: 192KB - Virtual size: 191KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ