Static task
static1
Behavioral task
behavioral1
Sample
f5c2f514a0fc9da29627af167529d86888947745e53cd64daf7b77972b90b462.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f5c2f514a0fc9da29627af167529d86888947745e53cd64daf7b77972b90b462.exe
Resource
win10v2004-20220901-en
General
-
Target
f5c2f514a0fc9da29627af167529d86888947745e53cd64daf7b77972b90b462
-
Size
76KB
-
MD5
a06a240f7b499d2c2876e08bef46c2b0
-
SHA1
2386080ffb7509310add8eb364736a666cf23d8b
-
SHA256
f5c2f514a0fc9da29627af167529d86888947745e53cd64daf7b77972b90b462
-
SHA512
26208fbd81a5b26652064b427838774e98beeaeaffc2be54455c7f2d01b28d8e881f47f122e110374ac741b9530e9c79ce14b6e6e38b4e8df8513bd702925e73
-
SSDEEP
1536:LKTg6tZkYVxqdE5NLt3mZCSRCxDka6tgCV0pR:esixsE5b3mZCwC1AtgoQR
Malware Config
Signatures
Files
-
f5c2f514a0fc9da29627af167529d86888947745e53cd64daf7b77972b90b462.exe windows x86
2c2a74fe0776f6aac245ba9e8eeec7c6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
ReadFile
LocalFree
SetFilePointer
LocalAlloc
GlobalDeleteAtom
Sleep
GlobalAddAtomA
GlobalFree
GlobalAlloc
IsDBCSLeadByte
GlobalLock
GlobalFindAtomA
CompareStringA
WideCharToMultiByte
WriteFile
CloseHandle
GetWindowsDirectoryA
OpenProcess
GetVersion
FreeLibrary
RemoveDirectoryA
GetLastError
DeleteFileA
FindFirstFileA
FindClose
lstrlenA
lstrcpyA
lstrcatA
lstrcmpA
lstrcpynA
MultiByteToWideChar
CreateProcessA
WaitForSingleObject
SetErrorMode
GetCurrentDirectoryA
OutputDebugStringA
LoadLibraryA
GetProcAddress
GetFileAttributesA
GlobalUnlock
VirtualAlloc
IsBadWritePtr
IsBadReadPtr
SetUnhandledExceptionFilter
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
IsBadCodePtr
FreeEnvironmentStringsW
FreeEnvironmentStringsA
lstrcmpiA
GetModuleFileNameA
UnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
HeapAlloc
HeapFree
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
GetCurrentProcess
TerminateProcess
ExitProcess
SetCurrentDirectoryA
SetEnvironmentVariableA
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
PackDDElParam
SendMessageA
DispatchMessageA
DefWindowProcA
CharNextA
DestroyWindow
UnregisterClassA
CreateWindowExA
RegisterClassA
wsprintfA
UnpackDDElParam
LoadStringA
LoadIconA
LoadCursorA
MessageBoxA
wvsprintfA
TranslateMessage
GetMessageA
SetCursor
ShowCursor
SetDlgItemTextA
SetWindowLongA
EndDialog
GetDlgItem
SetFocus
DialogBoxParamA
UpdateWindow
SetWindowTextA
InvalidateRect
CharUpperA
CharPrevA
BeginPaint
GetClientRect
DrawTextA
SetRect
EndPaint
PostQuitMessage
GetSystemMenu
EnableMenuItem
CreateDialogParamA
GetWindowRect
GetSystemMetrics
SetWindowPos
ShowWindow
PostMessageA
PeekMessageA
FillRect
SetClassLongA
gdi32
CreateSolidBrush
SetROP2
Rectangle
SelectObject
SetTextColor
SetBkMode
GetStockObject
GetTextMetricsA
ExtTextOutA
CreateFontIndirectA
DeleteObject
advapi32
RegOpenKeyA
RegEnumValueA
RegEnumKeyA
RegDeleteKeyA
RegCloseKey
RegDeleteValueA
RegQueryValueExA
RegSetValueExA
RegCreateKeyA
shell32
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
OleInitialize
OleUninitialize
oleaut32
LoadTypeLi
Sections
.text Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE