Static task
static1
Behavioral task
behavioral1
Sample
dea3e5fa45e2b709e240b450e00eadd80dcd624f88b8dd45cb3220978e487735.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dea3e5fa45e2b709e240b450e00eadd80dcd624f88b8dd45cb3220978e487735.exe
Resource
win10v2004-20220812-en
General
-
Target
dea3e5fa45e2b709e240b450e00eadd80dcd624f88b8dd45cb3220978e487735
-
Size
505KB
-
MD5
901fd8a7416fd67667a3863072647250
-
SHA1
9e47b37b96d3b540e45f1360794bc5334798815c
-
SHA256
dea3e5fa45e2b709e240b450e00eadd80dcd624f88b8dd45cb3220978e487735
-
SHA512
0952772b4941f3e6251bf91672add77628d9ffd13f2954efb78ff273811ed962c3f912aab40b55d2be848b4b4655e1d3a1cdbeefdcc0c5195ac098714c99828a
-
SSDEEP
6144:H4h88HmXLnFUrudpWWYk3OmsvRebR/YCMwG0d1oRhPaz/twt3y0FS:Yh88HmpMudpXYWOnw/YdV0jojvU
Malware Config
Signatures
Files
-
dea3e5fa45e2b709e240b450e00eadd80dcd624f88b8dd45cb3220978e487735.exe windows x86
15087e170feddc74f8f440b9a8ce9ffd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetClassLongW
MonitorFromPoint
EnableMenuItem
IsWindowVisible
GetWindowDC
MoveWindow
SetMenuItemInfoA
AppendMenuA
CreatePopupMenu
SetWindowTextA
DestroyIcon
LoadIconA
InvalidateRect
CharLowerA
LoadBitmapA
KillTimer
IsZoomed
DestroyMenu
IsWinEventHookInstalled
IsWindowEnabled
SetFocus
GetCursorPos
ScreenToClient
SendMessageA
OpenClipboard
CloseClipboard
CallWindowProcA
MessageBeep
wsprintfA
MessageBoxA
CharUpperA
GetClipboardData
EnumClipboardFormats
EmptyClipboard
ScrollWindow
IsCharUpperW
GetClipboardSequenceNumber
GetDC
IsHungAppWindow
shell32
ShellExecuteA
DragAcceptFiles
DragFinish
SHGetFileInfoA
DragQueryFileA
gdi32
ModifyWorldTransform
PtVisible
CloseFigure
SetBoundsRect
GetCharWidthI
EqualRgn
Polyline
GetDCPenColor
ExtTextOutA
StartDocW
RectInRegion
GetGlyphOutlineA
SetPaletteEntries
StrokeAndFillPath
dbghelp
ImageNtHeader
ImageRvaToSection
ImageRvaToVa
comctl32
ImageList_ReplaceIcon
ImageList_Create
ImageList_Add
InitCommonControlsEx
ImageList_Remove
ImageList_Destroy
kernel32
LoadLibraryA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
HeapSize
VirtualFree
HeapCreate
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
HeapAlloc
HeapReAlloc
RtlUnwind
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
GetTickCount
LCMapStringW
FreeEnvironmentStringsA
GetModuleFileNameA
GetStdHandle
WriteFile
HeapFree
OpenProcess
ClearCommError
LocalAlloc
GetHandleInformation
GetCommandLineA
FindFirstFileA
VirtualAlloc
MulDiv
Sleep
ReadFile
GetCurrentProcessId
WriteProcessMemory
GetProcAddress
GetModuleHandleA
ReadProcessMemory
CloseHandle
SetThreadPriority
SetCurrentDirectoryA
ExitProcess
VirtualLock
VirtualUnlock
GetPrivateProfileStringA
WritePrivateProfileStringA
SetEndOfFile
CreateFileMappingA
MapViewOfFile
CopyFileA
lstrlenA
lstrcatA
lstrcpynA
CreateProcessA
SetFileAttributesA
GetSystemTimeAsFileTime
GetStartupInfoA
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
Sections
.text Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 150KB - Virtual size: 149KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 259KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ