Static task
static1
Behavioral task
behavioral1
Sample
5751688f4bbfdd6ccfb745c6cbe5c0b4dc03121dc4383de25b5e149203f1250e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5751688f4bbfdd6ccfb745c6cbe5c0b4dc03121dc4383de25b5e149203f1250e.exe
Resource
win10v2004-20220812-en
General
-
Target
5751688f4bbfdd6ccfb745c6cbe5c0b4dc03121dc4383de25b5e149203f1250e
-
Size
102KB
-
MD5
902678bec1d99e92e2aa1f8cfa5c0200
-
SHA1
2b1bca8415a05275a583ebd464fecd45445c4ff1
-
SHA256
5751688f4bbfdd6ccfb745c6cbe5c0b4dc03121dc4383de25b5e149203f1250e
-
SHA512
7136aa987daf62bdd03a4b8806916ff54951ea91f477c91b4c67a4981d7836b5b7d30de9b9a3113c37f0b63df4c0845a9dd7920b11b5bb24dfcb6fe30bbf3070
-
SSDEEP
3072:9TA13nWDI9I4lUGLlr45CH0hi7Q6FELkN7guMA:SFnW2tlUG545CH0V6F9YA
Malware Config
Signatures
Files
-
5751688f4bbfdd6ccfb745c6cbe5c0b4dc03121dc4383de25b5e149203f1250e.exe windows x86
76f09e5d3e0288d956f1ef107ead0ace
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
Sleep
lstrlenA
GetWindowsDirectoryA
DeleteFileA
GetCurrentDirectoryA
lstrcpyA
GetSystemInfo
VirtualProtect
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
SetEndOfFile
GetCPInfo
GetOEMCP
CreateFileA
SetFilePointer
FlushFileBuffers
SetStdHandle
IsBadCodePtr
IsBadReadPtr
LoadLibraryA
GetFileType
SetHandleCount
InterlockedExchange
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
HeapSize
WriteFile
ReadFile
CloseHandle
SetUnhandledExceptionFilter
VirtualQuery
GetModuleFileNameA
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
HeapReAlloc
HeapAlloc
GetCommandLineA
GetStartupInfoA
QueryPerformanceCounter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapFree
ExitProcess
RtlUnwind
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
GetLastError
GetFileAttributesA
HeapDestroy
user32
ReleaseDC
GetDC
GetSystemMetrics
LoadCursorA
LoadIconA
UpdateWindow
ShowWindow
ClientToScreen
GetWindowRect
MoveWindow
BringWindowToTop
SetForegroundWindow
BeginPaint
EndPaint
LoadMenuA
DispatchMessageA
GetMessageA
TranslateMessage
SetCursor
DestroyWindow
PostQuitMessage
DefWindowProcA
RegisterClassA
MessageBoxA
CreateWindowExA
SetWindowPos
GetClientRect
gdi32
DeleteDC
StretchDIBits
CreateDCA
GetDeviceCaps
BitBlt
CreateDIBSection
CreateCompatibleDC
SelectObject
SetBkMode
GetStockObject
DeleteObject
comdlg32
GetSaveFileNameA
ole32
MkParseDisplayName
CreateBindCtx
CoCreateInstance
CoInitialize
CoUninitialize
oleaut32
SysStringLen
msvfw32
DrawDibOpen
DrawDibClose
DrawDibDraw
ksproxy.ax
KsSynchronousDeviceControl
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 38KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE