Static task
static1
Behavioral task
behavioral1
Sample
57faae1793101df5ffeb27b8102097000ab173b24caa8f5fd866cad96ed3adaf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
57faae1793101df5ffeb27b8102097000ab173b24caa8f5fd866cad96ed3adaf.exe
Resource
win10v2004-20220901-en
General
-
Target
57faae1793101df5ffeb27b8102097000ab173b24caa8f5fd866cad96ed3adaf
-
Size
356KB
-
MD5
80f7ab446609641eac8c03a093c051b6
-
SHA1
8404f547d304444e1906ea40c32bd2160e89b1f3
-
SHA256
57faae1793101df5ffeb27b8102097000ab173b24caa8f5fd866cad96ed3adaf
-
SHA512
3ba214a1d5ff47ab596190b377ca93854e13a6e572af4c94e46dc23ce139eabfcf087cb0c572de69b1a7233204f8f80fb872c033b59843af40d419a48173b438
-
SSDEEP
6144:duegGpcdihxHQDArsD1ues8jHOWm/fkBqRlBj0I9HJMLjhScW5zrgf3OE+qQh2Fk:dueFpKAxHQx5cfkwRlBj0IVJMpSpqM
Malware Config
Signatures
Files
-
57faae1793101df5ffeb27b8102097000ab173b24caa8f5fd866cad96ed3adaf.exe windows x86
4486df293467abb79f93fc65d4a91753
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualQuery
OpenSemaphoreA
ReadFile
CreateMutexA
LCMapStringA
EnumSystemCodePagesW
MultiByteToWideChar
TlsSetValue
GetProcAddress
ExitProcess
GetCurrentProcess
GetSystemTimeAsFileTime
InterlockedIncrement
OpenFileMappingA
SetThreadIdealProcessor
OpenMutexW
GetFileType
SetConsoleScreenBufferSize
CompareStringA
CompareFileTime
GetLongPathNameW
HeapAlloc
LCMapStringW
lstrlenA
GetThreadPriorityBoost
GetPrivateProfileSectionA
OpenMutexA
GetConsoleCursorInfo
EnumResourceNamesW
CompareStringW
GetCommandLineA
InterlockedCompareExchange
TerminateProcess
EnumDateFormatsA
FindAtomW
SetEnvironmentVariableA
GetStringTypeExW
GetEnvironmentVariableW
EnterCriticalSection
SetStdHandle
GetStdHandle
TlsGetValue
SetLastError
CreateFileA
IsDebuggerPresent
RtlUnwind
SetHandleCount
FileTimeToSystemTime
GetStringTypeW
GlobalFindAtomW
GetCurrentThreadId
GetSystemTime
GetShortPathNameA
GetModuleFileNameW
FreeLibraryAndExitThread
CreateDirectoryExA
ReadConsoleInputA
DeleteAtom
MapViewOfFileEx
InitializeCriticalSection
GetCurrentThread
GetModuleHandleA
FlushFileBuffers
WideCharToMultiByte
LoadLibraryA
CommConfigDialogA
GetEnvironmentStringsW
GetProfileIntW
GetStartupInfoW
GetStartupInfoA
SetConsoleTextAttribute
GetEnvironmentVariableA
GetVolumeInformationA
LocalFileTimeToFileTime
TlsAlloc
GetDiskFreeSpaceW
GetTimeZoneInformation
CloseHandle
UnhandledExceptionFilter
ReadConsoleOutputA
LeaveCriticalSection
SetEvent
ReadFileEx
WriteFile
HeapReAlloc
GetLastError
FreeEnvironmentStringsA
QueryPerformanceCounter
GetVersion
GetTickCount
GetCPInfo
GlobalAddAtomW
SetComputerNameA
GetDriveTypeW
SetFilePointer
HeapFree
VirtualFree
GetPrivateProfileSectionW
TlsFree
IsBadWritePtr
HeapCreate
GlobalGetAtomNameW
ReadConsoleW
SuspendThread
FindNextFileA
DebugActiveProcess
AllocConsole
SetEnvironmentVariableW
GetProcessAffinityMask
GetEnvironmentStrings
OpenSemaphoreW
FreeEnvironmentStringsW
GetDriveTypeA
GetStringTypeA
GlobalGetAtomNameA
HeapDestroy
WritePrivateProfileStructW
GetCurrentProcessId
ReadConsoleOutputCharacterW
lstrcmpiA
LocalAlloc
VirtualAlloc
GetLocalTime
lstrcatA
CommConfigDialogW
GetCommandLineW
OutputDebugStringW
InterlockedExchange
DeleteCriticalSection
InterlockedDecrement
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
DeleteFileA
comdlg32
GetOpenFileNameA
GetFileTitleA
gdi32
DeleteDC
CreateEllipticRgn
Escape
CreateDCW
GetTextExtentPointW
CopyMetaFileW
SetBkColor
GetTextMetricsW
GetCurrentPositionEx
Polyline
CreateCompatibleBitmap
DeleteObject
GetBrushOrgEx
GetCharacterPlacementW
EnumFontFamiliesExA
GetObjectW
SetMapMode
SelectObject
CreateScalableFontResourceW
ExcludeClipRect
GetDeviceCaps
wininet
InternetUnlockRequestFile
HttpQueryInfoA
FtpFindFirstFileW
comctl32
ImageList_LoadImage
DrawInsert
CreateStatusWindowW
CreateStatusWindow
ImageList_SetImageCount
ImageList_AddIcon
ImageList_GetDragImage
CreatePropertySheetPageA
ImageList_DragEnter
ImageList_LoadImageA
ImageList_SetDragCursorImage
ImageList_Create
InitCommonControlsEx
ImageList_GetBkColor
ImageList_GetImageCount
ImageList_DragShowNolock
user32
RegisterClassExA
CloseDesktop
LoadCursorW
SendMessageW
CharNextW
DrawFrameControl
CallWindowProcW
InvertRect
GetComboBoxInfo
UnionRect
RegisterClassA
DdeFreeDataHandle
SwitchDesktop
IsIconic
DdeDisconnectList
DestroyWindow
PtInRect
ShowWindow
GetWindowContextHelpId
CharLowerA
GetClipboardFormatNameW
GetThreadDesktop
EnumWindows
EnumPropsExA
CreateWindowExW
SetSysColors
LoadBitmapW
RemovePropW
SendDlgItemMessageW
MessageBoxA
GetWindowLongW
DefWindowProcW
DestroyMenu
advapi32
CryptDestroyHash
Sections
.text Size: 140KB - Virtual size: 138KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ