Static task
static1
Behavioral task
behavioral1
Sample
99563194afefd6b4ee228b3b490f143a2f4fce1f06296b3f16a52743066a3836.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
99563194afefd6b4ee228b3b490f143a2f4fce1f06296b3f16a52743066a3836.exe
Resource
win10v2004-20220812-en
General
-
Target
99563194afefd6b4ee228b3b490f143a2f4fce1f06296b3f16a52743066a3836
-
Size
690KB
-
MD5
5546204d280781a163d9dcc108d42571
-
SHA1
b569830f41e9c84e93d649870e9d0c253103daec
-
SHA256
99563194afefd6b4ee228b3b490f143a2f4fce1f06296b3f16a52743066a3836
-
SHA512
54a3db4b5b8d024e8fc8db6532a2e750516d603fb25d35d1e75045d1842f74e491e4fbe808900231dda757ec3226453b0cac044c6273f8b7f1253498da09ce52
-
SSDEEP
12288:YjaMD8yx7zGL8Zn8PcJi/A9NcAzFyKu+726kTxUEXNFoRy7vIerWg1RVxjFYGRhY:YjaMD/x3ZnFJJNdzNl2/1Nd2RybzFhFr
Malware Config
Signatures
Files
-
99563194afefd6b4ee228b3b490f143a2f4fce1f06296b3f16a52743066a3836.exe windows x86
e074cc02bd3e897fe60a0d9ed5a5812e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetIconInfo
GetMenuItemCount
CallMsgFilter
MessageBeep
RegisterClassExA
DrawIconEx
BeginDeferWindowPos
GetClipboardData
LoadIconA
EnumPropsExW
DrawStateW
SetFocus
SetWindowTextA
ScreenToClient
SetRectEmpty
EnableWindow
ScrollWindowEx
GetDoubleClickTime
DdeQueryStringW
CascadeWindows
GetFocus
GetSysColor
LoadIconW
RegisterClassW
DdeCreateStringHandleW
RegisterClassA
ToAsciiEx
CopyRect
shell32
FindExecutableW
SheChangeDirA
SHBrowseForFolderA
SHUpdateRecycleBinIcon
RealShellExecuteExW
comctl32
DrawStatusText
InitCommonControlsEx
ImageList_LoadImageW
_TrackMouseEvent
ImageList_SetOverlayImage
ImageList_SetBkColor
ImageList_LoadImageA
ImageList_SetFilter
DestroyPropertySheetPage
ImageList_Remove
CreateToolbarEx
DrawStatusTextA
ImageList_Merge
MakeDragList
ImageList_GetDragImage
ImageList_Replace
kernel32
GetCurrentProcessId
LocalFree
WideCharToMultiByte
GetTempFileNameA
GetStartupInfoA
SetConsoleCtrlHandler
LCMapStringW
ReadConsoleInputW
GetAtomNameA
lstrcat
GetStringTypeW
FindResourceA
QueryPerformanceCounter
GetOEMCP
GetModuleHandleW
GetComputerNameA
SetVolumeLabelW
SetStdHandle
GetConsoleCursorInfo
SetConsoleWindowInfo
TlsFree
FormatMessageA
GetEnvironmentStrings
VirtualFreeEx
InterlockedDecrement
GetLastError
InterlockedExchangeAdd
GetPrivateProfileStringA
SetEnvironmentVariableA
GlobalFix
LocalSize
GlobalGetAtomNameW
InterlockedCompareExchange
GetProfileStringW
GetModuleHandleA
GetTimeZoneInformation
IsBadWritePtr
EnterCriticalSection
EnumSystemLocalesW
DeleteFiber
OpenMutexA
HeapFree
GetCurrentThreadId
lstrcpynW
lstrcmp
SetLocalTime
CloseHandle
UnhandledExceptionFilter
WriteProfileSectionW
UnmapViewOfFile
GetWindowsDirectoryW
CreateWaitableTimerA
SetThreadPriority
GetMailslotInfo
FlushFileBuffers
DuplicateHandle
LockFile
LocalFileTimeToFileTime
GetTickCount
lstrcmpA
GlobalAlloc
GetFileType
MultiByteToWideChar
GetEnvironmentStringsW
VirtualQueryEx
VirtualQuery
CreateEventW
LeaveCriticalSection
EnumDateFormatsA
GetACP
LCMapStringA
SetComputerNameA
lstrlenA
InterlockedIncrement
VirtualUnlock
ReadConsoleW
SetEvent
GetCommandLineA
LoadLibraryA
FindFirstFileExA
ConnectNamedPipe
FreeEnvironmentStringsW
VirtualFree
WriteFile
CompareStringA
GetStringTypeA
CreateFileMappingW
GetModuleFileNameA
HeapReAlloc
GetLongPathNameA
GetEnvironmentStringsA
SetConsoleCursorInfo
SetFilePointer
FreeLibraryAndExitThread
TerminateProcess
ExitProcess
SetCurrentDirectoryA
GlobalFindAtomW
GetCurrentThread
GetLocalTime
CreatePipe
WaitForDebugEvent
GetVersion
FormatMessageW
InterlockedExchange
VirtualAlloc
WriteConsoleOutputW
CopyFileA
FindNextFileW
TlsAlloc
GetSystemTimeAsFileTime
TlsSetValue
FreeEnvironmentStringsA
GetCurrentProcess
SetLastError
LocalAlloc
GetExitCodeThread
GetStringTypeExA
GetFileSize
GetStdHandle
RtlUnwind
DeleteCriticalSection
ContinueDebugEvent
SetLocaleInfoA
CopyFileExA
GetProfileIntA
ReleaseSemaphore
GetProcAddress
InitializeCriticalSection
lstrcmpiW
ReadFile
CreateMutexA
SetHandleCount
VirtualProtectEx
TlsGetValue
GetCPInfo
lstrcpyn
CreateDirectoryW
HeapCreate
CompareStringW
HeapAlloc
GetSystemTime
HeapDestroy
Sections
.text Size: 125KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 386KB - Virtual size: 386KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 133KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ