Static task
static1
Behavioral task
behavioral1
Sample
62061baed35aef0f9243dafcf1673100010b1e3c00253d027ebe336a4aee67c7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
62061baed35aef0f9243dafcf1673100010b1e3c00253d027ebe336a4aee67c7.exe
Resource
win10v2004-20220901-en
General
-
Target
62061baed35aef0f9243dafcf1673100010b1e3c00253d027ebe336a4aee67c7
-
Size
732KB
-
MD5
43422f1023dcd7b92d7c7d8243adab76
-
SHA1
0cb10f37a0de9040d0b1d83a1e09227674f40450
-
SHA256
62061baed35aef0f9243dafcf1673100010b1e3c00253d027ebe336a4aee67c7
-
SHA512
e1c0909420f01e706d0acf077167b8902f3fd6060e763bb3c0aa4e6e66509e370c1cd3f36f4d7d3d327ac14b95f997ffeb6208b9cb0d15139eda10c84f6b6836
-
SSDEEP
12288:FDfwjeE2whWoyGKUVmOCvcoeFM002yJ9GYSQIBd2FBXAEmQK1YuD7PBlp:twjFhWoyGDmOCvclFM002Bx4FKGuD7
Malware Config
Signatures
Files
-
62061baed35aef0f9243dafcf1673100010b1e3c00253d027ebe336a4aee67c7.exe windows x86
0245569ca5d84b42553276d7156bf077
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_Copy
DrawStatusText
ImageList_GetDragImage
CreateToolbarEx
GetEffectiveClientRect
CreateStatusWindow
ImageList_DragShowNolock
CreatePropertySheetPageW
ImageList_SetDragCursorImage
ImageList_Duplicate
ImageList_Read
InitCommonControlsEx
ImageList_GetFlags
ImageList_LoadImage
ImageList_BeginDrag
ImageList_DrawIndirect
ImageList_Merge
kernel32
lstrlenW
RtlUnwind
GetCurrentProcess
EnumTimeFormatsA
GetVersionExA
CompareStringW
CloseHandle
lstrcmpiA
SetFileAttributesW
GetOEMCP
HeapDestroy
SetStdHandle
CreateMutexW
DeleteCriticalSection
GetModuleHandleA
GetCPInfo
GetDiskFreeSpaceW
WaitNamedPipeW
GetTickCount
GetCurrentDirectoryA
SetLastError
GetSystemDefaultLCID
SetThreadLocale
GetLastError
WriteConsoleInputW
FindNextFileA
GlobalDeleteAtom
GetProcAddress
GetPrivateProfileSectionW
TlsSetValue
GetStdHandle
GetCommandLineA
GetModuleHandleW
LCMapStringA
ExitProcess
HeapCreate
EnterCriticalSection
WriteConsoleOutputCharacterW
MultiByteToWideChar
CreateWaitableTimerW
GetEnvironmentStringsW
GetProcAddress
GetConsoleCursorInfo
CompareStringA
EnumCalendarInfoW
GetLocaleInfoW
SetEnvironmentVariableA
FreeLibrary
GetFileType
InitializeCriticalSection
GetPrivateProfileStringA
LoadLibraryA
IsValidLocale
LeaveCriticalSection
CreateMutexA
UnhandledExceptionFilter
GetStringTypeW
GetStartupInfoA
HeapValidate
FreeLibraryAndExitThread
GetThreadPriority
OpenMutexA
OpenSemaphoreW
LockFile
WriteProfileStringW
WriteProfileStringA
VirtualProtect
HeapAlloc
GetThreadLocale
IsValidCodePage
FreeEnvironmentStringsA
GetCurrentThreadId
TerminateProcess
LocalReAlloc
GetCurrencyFormatW
GetTimeFormatA
GetCurrencyFormatA
EnumSystemLocalesA
AddAtomW
HeapSize
QueryPerformanceCounter
VirtualQuery
GetShortPathNameW
TlsAlloc
GetFileAttributesW
LCMapStringW
UnlockFile
GetFullPathNameA
FreeEnvironmentStringsW
HeapFree
GetDateFormatA
OpenWaitableTimerW
GetProfileStringW
TlsGetValue
GetEnvironmentStrings
HeapReAlloc
GetCurrentProcessId
EnumResourceNamesA
InterlockedExchange
VirtualFree
InterlockedCompareExchange
WideCharToMultiByte
VirtualAlloc
GetSystemInfo
IsBadWritePtr
FlushFileBuffers
GetUserDefaultLCID
GetACP
CreateMailslotW
SetFileTime
ReadFile
GetPrivateProfileStringW
GetCurrentThread
WriteFile
GetTimeZoneInformation
SetHandleCount
GetStringTypeA
InterlockedIncrement
TlsFree
GetSystemTimeAsFileTime
LoadModule
SetFilePointer
GetModuleFileNameA
GetLocaleInfoA
FillConsoleOutputAttribute
VirtualAllocEx
LocalFree
CreateSemaphoreW
user32
ValidateRgn
SetLastErrorEx
WindowFromPoint
GetAncestor
HideCaret
GetTabbedTextExtentA
DefWindowProcW
GetMenuItemRect
ChildWindowFromPointEx
ShowOwnedPopups
IsMenu
ShowWindow
GetUserObjectInformationA
SetDlgItemTextA
GetCursorPos
IsClipboardFormatAvailable
CallWindowProcA
BlockInput
MessageBoxW
CreateWindowExA
EnumPropsExW
GetDoubleClickTime
RegisterClassA
SetCaretBlinkTime
EnumDisplayDevicesW
SetMenuInfo
InflateRect
RegisterClassExA
DestroyWindow
DrawEdge
SetWindowsHookA
SetMenuContextHelpId
ScreenToClient
ExitWindowsEx
ChangeDisplaySettingsExW
VkKeyScanExA
Sections
.text Size: 96KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 464KB - Virtual size: 460KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ