Static task
static1
Behavioral task
behavioral1
Sample
4471072c009f85ce9dc2600588b676af38203f714b31e5364de73c3da8fd510e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4471072c009f85ce9dc2600588b676af38203f714b31e5364de73c3da8fd510e.exe
Resource
win10v2004-20220812-en
General
-
Target
4471072c009f85ce9dc2600588b676af38203f714b31e5364de73c3da8fd510e
-
Size
628KB
-
MD5
8198bfba509939fbb78528808ec0562e
-
SHA1
00b77f3f1d94d80a46024da7278b7f8706f1c1d7
-
SHA256
4471072c009f85ce9dc2600588b676af38203f714b31e5364de73c3da8fd510e
-
SHA512
f96c33d141d0fd2ee76c457bbb8e7d09c7f573fc46e57f954e546126408d5e271821acb774266aa4351bde1488168a0f26f6253a9939a626cb2f28e11f349fe4
-
SSDEEP
12288:bUSFCeiUuJVhLCEMV7Egn92+i/hJBbfW4NTRWF7LvO:wSo9lmEe7Eg4n/7BbfW4VwF+
Malware Config
Signatures
Files
-
4471072c009f85ce9dc2600588b676af38203f714b31e5364de73c3da8fd510e.exe windows x86
26e6f95c9a2d779ed23390defbacdf9a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
gdi32
CreateSolidBrush
SelectObject
SetTextColor
DeleteDC
SetBkColor
BitBlt
kernel32
GetCommandLineA
GetCurrentThreadId
GetTickCount
GetCurrentProcessId
GetVersion
GetModuleHandleA
GetCurrentThread
ExitProcess
GetLastError
VirtualAlloc
VirtualFree
CreateProcessA
GetEnvironmentStrings
GetModuleHandleW
GetACP
CloseHandle
ReadFile
TlsFree
RaiseException
InterlockedCompareExchange
HeapSize
GetCommandLineW
LockResource
SizeofResource
FileTimeToLocalFileTime
lstrlenW
GlobalUnlock
GetEnvironmentStringsW
LCMapStringA
GetSystemInfo
LeaveCriticalSection
HeapAlloc
CreateFileA
TlsSetValue
GetFileType
CreateEventA
Sleep
GlobalLock
DuplicateHandle
FindFirstFileW
CreateFileMappingA
ResetEvent
GetProcessHeap
GetProcAddress
DeleteFileW
CreateDirectoryA
LCMapStringW
GetFileSize
GetStartupInfoA
LoadLibraryA
FlushFileBuffers
TlsAlloc
QueryPerformanceCounter
GetOEMCP
lstrcmpiA
SetHandleCount
EnterCriticalSection
WriteConsoleW
SetEndOfFile
GetConsoleMode
TerminateProcess
GetSystemDirectoryA
SetUnhandledExceptionFilter
CreateThread
SetFilePointer
GetLocalTime
MultiByteToWideChar
LoadLibraryExW
UnhandledExceptionFilter
LoadLibraryExA
IsDebuggerPresent
GetModuleFileNameW
SetLastError
FormatMessageA
InterlockedDecrement
FindClose
InitializeCriticalSection
LocalFree
FreeLibrary
GetStringTypeW
HeapReAlloc
GetSystemTimeAsFileTime
WriteFile
InterlockedExchange
GetStringTypeA
WideCharToMultiByte
GetTempPathA
SetStdHandle
LocalAlloc
GetLocaleInfoA
GetCurrentProcess
DeleteCriticalSection
FreeEnvironmentStringsA
HeapFree
HeapDestroy
WaitForSingleObject
FileTimeToSystemTime
GetConsoleOutputCP
GetStdHandle
user32
GetFocus
CallWindowProcA
GetClientRect
DrawTextA
SystemParametersInfoA
GetSysColor
ReleaseDC
LoadIconA
ScreenToClient
GetDlgItem
GetWindowLongA
SetWindowTextA
EndDialog
SetWindowLongA
PostMessageA
GetSystemMetrics
DefWindowProcA
BeginPaint
MapWindowPoints
FillRect
GetSubMenu
EnableMenuItem
LoadStringA
IsWindowEnabled
TranslateMessage
EnableWindow
ShowWindow
GetParent
GetDC
PeekMessageA
DispatchMessageA
SetWindowPos
PostQuitMessage
Sections
.text Size: 586KB - Virtual size: 912KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ