Static task
static1
Behavioral task
behavioral1
Sample
9149def68bac14590ba024f10372b9c9736f00e47777e7be32de0fe2c7ce7e43.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9149def68bac14590ba024f10372b9c9736f00e47777e7be32de0fe2c7ce7e43.exe
Resource
win10v2004-20220812-en
General
-
Target
9149def68bac14590ba024f10372b9c9736f00e47777e7be32de0fe2c7ce7e43
-
Size
181KB
-
MD5
9628742ebafc89821f99f1028c30988c
-
SHA1
d270ee448e8096e41a077cee35f5b3c56499ae61
-
SHA256
9149def68bac14590ba024f10372b9c9736f00e47777e7be32de0fe2c7ce7e43
-
SHA512
e54213dda60a09c22473f8a8f617782e7ef4c35b97e6445910f591fd92c4db167c255bd69ad564e2ce8823c23024f0929d335c57ddb9669a9fc268145e91aa70
-
SSDEEP
3072:yBAsB/nrr/SA/wpaS3SVs+Hr5YjqIXo70IvRp4wZa5N9mBS3YS9Ys:yBAGn3aA/wppSVrrNIY70sRp4wabmRS9
Malware Config
Signatures
Files
-
9149def68bac14590ba024f10372b9c9736f00e47777e7be32de0fe2c7ce7e43.exe windows x86
6f7161389880c0f43d9fb220ecb262ef
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
fabs
sin
srand
strlen
memmove
sprintf
cos
wcschr
memcpy
user32
OffsetRect
GetSysColor
GetScrollInfo
IsIconic
wsprintfA
ScreenToClient
GetClassNameA
ShowScrollBar
GetCapture
DrawMenuBar
EnableWindow
GetDesktopWindow
GetWindowTextA
TranslateMessage
GetForegroundWindow
FindWindowA
GetDC
MoveWindow
DestroyCursor
SetCapture
GetKeyboardLayoutList
SetCursor
GetSubMenu
GetWindowThreadProcessId
CharUpperBuffA
GetMenuItemCount
EndPaint
GetCursorPos
SetScrollInfo
BeginPaint
CreateWindowExA
DefWindowProcA
CharNextW
DeleteMenu
DestroyWindow
UnregisterClassA
PeekMessageA
SetMenuItemInfoA
MessageBeep
CallWindowProcA
AdjustWindowRectEx
KillTimer
SetWindowPos
CreateIcon
SetWindowTextA
CheckMenuItem
RegisterWindowMessageA
GetClipboardData
LoadCursorA
DrawFrameControl
GetWindowRect
IsRectEmpty
SetWindowLongW
GetMessagePos
GetMenuItemID
SetWindowsHookExA
SetTimer
DrawEdge
GetActiveWindow
IsDialogMessageA
SetFocus
GetSystemMenu
GetDCEx
InsertMenuA
GetClassInfoA
GetKeyboardLayout
IsWindowUnicode
ActivateKeyboardLayout
MapVirtualKeyA
LoadBitmapA
EnumThreadWindows
GetMenuItemInfoA
DestroyMenu
CharLowerA
GetWindowLongW
MsgWaitForMultipleObjects
UpdateWindow
GetParent
GetKeyboardLayoutNameA
SendMessageW
SetScrollRange
PostMessageA
IsZoomed
IsWindowVisible
GetMenuStringA
SetWindowPlacement
ReleaseDC
GetPropA
EmptyClipboard
CreatePopupMenu
IsWindowEnabled
UnhookWindowsHookEx
MessageBoxA
SystemParametersInfoA
CallNextHookEx
GetKeyboardType
RemoveMenu
DrawIcon
OemToCharA
RedrawWindow
GetKeyState
SetForegroundWindow
LoadKeyboardLayoutA
GetWindow
SetMenu
CharNextA
ScrollWindow
GetClientRect
SetPropA
InsertMenuItemA
DestroyIcon
GetSystemMetrics
CloseClipboard
PtInRect
SetScrollPos
SetWindowLongA
RemovePropA
GetWindowDC
SetClipboardData
PeekMessageW
GetLastActivePopup
CreateMenu
DrawAnimatedRects
SetClassLongA
GetDlgItem
DrawTextA
ShowWindow
GetScrollPos
IsWindow
GetWindowLongA
LoadIconA
LoadStringA
GetSysColorBrush
DispatchMessageA
GetFocus
IntersectRect
CharToOemA
FrameRect
PostQuitMessage
EnumWindows
GetIconInfo
RegisterClassA
GetKeyboardState
GetMenu
ChildWindowFromPoint
GetMenuState
TrackPopupMenu
WaitMessage
GetKeyNameTextA
SetParent
GetWindowPlacement
CharLowerBuffA
GetTopWindow
DrawIconEx
InflateRect
ReleaseCapture
IsDialogMessageW
SendMessageA
EqualRect
DefMDIChildProcA
OpenClipboard
TranslateMDISysAccel
EnableScrollBar
ShowOwnedPopups
EnableMenuItem
WindowFromPoint
FillRect
MapWindowPoints
GetCursor
SetRect
IsChild
kernel32
VirtualFree
FindClose
GetFileType
SetFilePointer
GetCurrentThreadId
lstrcpynA
GetModuleHandleA
WaitForSingleObject
SizeofResource
FreeResource
GetVersion
GetSystemDefaultLangID
LocalReAlloc
GetEnvironmentStrings
GetProcessHeap
LoadResource
RaiseException
GetFileSize
MoveFileExA
ReadFile
InitializeCriticalSection
lstrcatA
ResetEvent
GetStringTypeW
SetEndOfFile
GetTickCount
GetCurrentProcess
VirtualAlloc
GetStartupInfoA
GetFileAttributesA
LocalFree
LoadLibraryA
CreateFileA
GetCPInfo
SetEvent
GetModuleFileNameA
lstrlenA
GetDateFormatA
CloseHandle
GetThreadLocale
lstrcmpiA
FindFirstFileA
GetCurrentThread
ExitProcess
GetLastError
WideCharToMultiByte
HeapAlloc
lstrcpyA
GetOEMCP
GetStringTypeA
MoveFileA
Sleep
FindResourceA
GlobalDeleteAtom
LoadLibraryExA
WriteFile
VirtualQuery
CompareStringA
DeleteFileA
GetACP
MulDiv
GetVersionExA
GlobalAddAtomA
SetHandleCount
GetFullPathNameA
SetErrorMode
CreateThread
LocalAlloc
GetLocalTime
HeapDestroy
FreeLibrary
ExitThread
EnumCalendarInfoA
LockResource
GetStdHandle
FormatMessageA
GlobalFindAtomA
GlobalAlloc
GetCurrentProcessId
SetLastError
GetProcAddress
CreateEventA
SetThreadLocale
GetUserDefaultLCID
Sections
CODE Size: 167KB - Virtual size: 166KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.edata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 4KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
BSS Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ