Static task
static1
Behavioral task
behavioral1
Sample
546a82fda60232980cb745b1d9f4d7e6c6b0829a1a8ae31a18804614fbd8c148.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
546a82fda60232980cb745b1d9f4d7e6c6b0829a1a8ae31a18804614fbd8c148.exe
Resource
win10v2004-20220812-en
General
-
Target
546a82fda60232980cb745b1d9f4d7e6c6b0829a1a8ae31a18804614fbd8c148
-
Size
608KB
-
MD5
7044ee83b5064872634b96286c883484
-
SHA1
4ac5eb699ab839c133d28198d0829ac7b244cb85
-
SHA256
546a82fda60232980cb745b1d9f4d7e6c6b0829a1a8ae31a18804614fbd8c148
-
SHA512
a78222480e8a1e367cfc4062571c95ff04d60550dd752e7a91759f30fb7c08f722591d3500856f22a99055430c68eebd23cecdf1082017d94260de3c25bb0a35
-
SSDEEP
12288:tUzMkyC3LGiGLnErQf1hoYX/6ORviTvrW1g0OQAy:oh3LGiGLErQN5Di7Ug0JA
Malware Config
Signatures
Files
-
546a82fda60232980cb745b1d9f4d7e6c6b0829a1a8ae31a18804614fbd8c148.exe windows x86
dd4e96e6880538150e1867f5dbd699e5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EndTask
RemoveMenu
DestroyWindow
MessageBoxA
DrawFrame
EndDeferWindowPos
GetThreadDesktop
ScrollDC
EnumPropsExW
RegisterClassExA
LoadIconW
SetMenu
DefMDIChildProcA
CreateWindowExW
ChildWindowFromPoint
ImpersonateDdeClientWindow
LoadMenuW
DdePostAdvise
RegisterClassA
ShowWindow
ToUnicodeEx
GetInputDesktop
DragDetect
DefWindowProcW
kernel32
SetConsoleCtrlHandler
GetVersionExA
SetFilePointer
GetThreadPriorityBoost
GetProcAddress
VirtualProtect
WideCharToMultiByte
UnhandledExceptionFilter
GetLocaleInfoA
LCMapStringA
GetModuleFileNameA
GetTimeZoneInformation
RemoveDirectoryW
InterlockedDecrement
GetACP
HeapAlloc
InitializeCriticalSection
GetSystemTimeAsFileTime
GetCurrentThreadId
GetFileType
HeapCreate
QueryPerformanceCounter
TerminateProcess
ReadConsoleOutputW
GetCurrentThread
LeaveCriticalSection
CloseHandle
ExitProcess
EnumSystemLocalesA
GetStringTypeW
SetLocalTime
LoadResource
GetTickCount
GetTimeFormatA
LCMapStringW
CreateMutexA
GetOEMCP
IsValidCodePage
GetStdHandle
HeapDestroy
HeapFree
GetFileAttributesA
CreateSemaphoreW
GetCPInfo
ReadFile
GetStringTypeA
IsBadWritePtr
DebugBreak
VirtualFree
GetCurrentProcess
GetLocaleInfoW
OpenMutexA
HeapReAlloc
TlsAlloc
TryEnterCriticalSection
HeapValidate
TlsGetValue
SetPriorityClass
GetStartupInfoW
VirtualQuery
GetEnvironmentStringsW
SetEnvironmentVariableA
IsValidLocale
TerminateThread
GetCommandLineA
SetLastError
FreeEnvironmentStringsW
GetModuleHandleA
FlushFileBuffers
LoadLibraryA
InterlockedExchange
CreateNamedPipeW
WriteFile
VirtualQueryEx
CompareStringW
GetUserDefaultLCID
GetStartupInfoA
GetSystemInfo
EnterCriticalSection
GetAtomNameW
InterlockedIncrement
GetLastError
VirtualAlloc
TlsFree
GetEnvironmentStrings
SetEvent
CompareStringA
SetHandleCount
FreeEnvironmentStringsA
SetStdHandle
GetCurrentProcessId
GetModuleFileNameW
DeleteCriticalSection
GetCommandLineW
TlsSetValue
RtlUnwind
OutputDebugStringA
IsBadReadPtr
MultiByteToWideChar
GetDateFormatA
comctl32
CreateStatusWindowA
InitCommonControlsEx
ImageList_DrawEx
ImageList_AddIcon
ImageList_Duplicate
Sections
.text Size: 212KB - Virtual size: 209KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256KB - Virtual size: 253KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ