Static task
static1
Behavioral task
behavioral1
Sample
4f8722f67b05b48d2e8f4ec071f5f5383d68422759faea20ca4efac1ccc52cc3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4f8722f67b05b48d2e8f4ec071f5f5383d68422759faea20ca4efac1ccc52cc3.exe
Resource
win10v2004-20220812-en
General
-
Target
4f8722f67b05b48d2e8f4ec071f5f5383d68422759faea20ca4efac1ccc52cc3
-
Size
504KB
-
MD5
76a0cc4f79a8ebe9d111f73b4d3d9685
-
SHA1
e9a2fc53b8557647992d2e99f89d196402911ef5
-
SHA256
4f8722f67b05b48d2e8f4ec071f5f5383d68422759faea20ca4efac1ccc52cc3
-
SHA512
b81ef9716676fbffc65523d39c3fe4acff4f47c021476312e022f48f749ab621d1968c31f8088e922b86ed35b6fc62fb6ead4a1937157415f141a9aba4dd481e
-
SSDEEP
6144:38dcfxKqj1ztpu+aYtPAt0MOHQeSIqj4fHOzHKdSdvqN3uMZiIQNIGi1LzoTki:Vjt8zYtP6lOl3f+KMdvqduL+GtF
Malware Config
Signatures
Files
-
4f8722f67b05b48d2e8f4ec071f5f5383d68422759faea20ca4efac1ccc52cc3.exe windows x86
c33198f2d77ff680bd1bf898916b61bc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CopyRect
UnhookWindowsHookEx
HideCaret
GetDlgCtrlID
DestroyAcceleratorTable
SetForegroundWindow
EnumWindows
GetScrollPos
SetDlgItemTextA
GetLastActivePopup
ModifyMenuA
LoadStringA
LoadAcceleratorsA
GetSystemMetrics
GetCursorPos
DefWindowProcA
DrawStateA
WinHelpA
LoadBitmapA
IsIconic
GetWindowPlacement
GetSysColor
RegisterClassExA
IsWindow
ValidateRect
MessageBoxA
UpdateWindow
CheckMenuItem
SetWindowPos
WaitForInputIdle
ShowWindow
DrawFocusRect
ScreenToClient
GetMenuItemInfoA
RegisterClassA
GetWindowDC
advapi32
RegEnumKeyA
OpenServiceA
RegCreateKeyExA
CloseServiceHandle
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyA
RegOpenKeyExA
gdi32
EqualRgn
Rectangle
GetBkColor
Polyline
GetTextAlign
OffsetRgn
PaintRgn
StartPage
SelectPalette
GetPolyFillMode
SetMapMode
ScaleWindowExtEx
SetViewportExtEx
GetGlyphOutlineA
GetCharWidthA
CreateDIBSection
SetTextColor
OffsetViewportOrgEx
ExtFloodFill
GetTextExtentPointA
BitBlt
GetObjectType
ExtTextOutA
GetFontData
CreateRoundRectRgn
GetNearestPaletteIndex
RoundRect
LineTo
ResizePalette
GetBkMode
ScaleViewportExtEx
RectInRegion
PatBlt
SetPolyFillMode
CreateICA
CreateCompatibleBitmap
CreateDIBitmap
CreateBitmap
ExtSelectClipRgn
SaveDC
FillRgn
GetSystemPaletteEntries
GetTextFaceA
CreateFontIndirectA
GetNearestColor
GetObjectA
SetPaletteEntries
CreateEllipticRgn
TextOutA
Arc
SetWindowOrgEx
SetViewportOrgEx
GetROP2
EndDoc
StartDocA
DeleteDC
GetDCOrgEx
SetPixelV
CreatePalette
SetROP2
GetViewportOrgEx
Polygon
Pie
GetRgnBox
CopyMetaFileA
SetRectRgn
ExcludeClipRect
GetWindowOrgEx
GetClipRgn
GetClipBox
GetMapMode
AbortDoc
DPtoLP
CreateRectRgnIndirect
EnumFontFamiliesExA
SelectObject
PolyBezier
GetTextMetricsA
GetCharABCWidthsA
CreatePatternBrush
PtVisible
MaskBlt
SetAbortProc
GetBoundsRect
SetWindowExtEx
GetWindowExtEx
ExtCreateRegion
CreateSolidBrush
GetStretchBltMode
MoveToEx
GetTextColor
Ellipse
SetStretchBltMode
EndPath
OffsetClipRgn
GetDIBits
FrameRgn
BeginPath
CreateHatchBrush
CreateCompatibleDC
SelectClipRgn
SetBkColor
GetCurrentObject
RectVisible
StrokePath
PtInRegion
FillPath
GetPaletteEntries
GetCurrentPositionEx
OffsetWindowOrgEx
Escape
CombineRgn
DeleteObject
EndPage
GetStockObject
GetRegionData
IntersectClipRect
GetPixel
SetTextAlign
SetPixel
ExtCreatePen
CreateRectRgn
UnrealizeObject
StretchDIBits
SetBrushOrgEx
PolyPolygon
GetViewportExtEx
Chord
CreatePen
CreateDCA
GetDeviceCaps
RealizePalette
SetBkMode
CreateFontA
StretchBlt
GetTextExtentPoint32A
RestoreDC
LPtoDP
CreatePolygonRgn
kernel32
HeapFree
SetStdHandle
LoadLibraryA
FreeEnvironmentStringsA
GetCurrentThreadId
RtlUnwind
WideCharToMultiByte
CompareStringA
RaiseException
GetTempPathA
LocalReAlloc
VirtualProtect
GetTickCount
FileTimeToLocalFileTime
WriteFile
GetCurrentProcessId
GetStringTypeA
OpenMutexA
FormatMessageA
TlsAlloc
SetEnvironmentVariableA
GetProcAddress
IsValidLocale
HeapAlloc
LockResource
VirtualQuery
SetUnhandledExceptionFilter
FindClose
GetCPInfo
HeapSize
GetACP
EnterCriticalSection
CreateMutexA
ReadFile
GetLocaleInfoA
GetProcessHeap
LCMapStringW
UnhandledExceptionFilter
TerminateProcess
TlsGetValue
SetEvent
GetFullPathNameA
GetDateFormatA
GetSystemDefaultLangID
VirtualFree
RemoveDirectoryA
GetEnvironmentStrings
HeapCreate
GetFileSize
InterlockedDecrement
lstrlenA
SetLastError
FreeLibrary
SetFilePointer
GlobalDeleteAtom
TlsSetValue
GlobalLock
GetEnvironmentStringsW
GetCommandLineA
GetSystemInfo
IsBadCodePtr
CompareStringW
GetStartupInfoA
HeapReAlloc
GetUserDefaultLCID
GetTimeFormatA
FlushFileBuffers
lstrcatA
CloseHandle
LCMapStringA
MultiByteToWideChar
GetModuleFileNameA
LocalFree
FreeEnvironmentStringsW
LeaveCriticalSection
GetLastError
lstrcpyA
GetVersionExA
GetSystemTimeAsFileTime
GetModuleHandleA
QueryPerformanceCounter
DeleteCriticalSection
GetStringTypeW
SetThreadPriority
GetSystemDirectoryA
WaitForSingleObject
GetCurrentProcess
GetFileType
InterlockedIncrement
SetHandleCount
InterlockedExchange
TlsFree
InitializeCriticalSection
HeapDestroy
GetStdHandle
GetOEMCP
SetConsoleCtrlHandler
VirtualAlloc
ExitProcess
GetTimeZoneInformation
GetFileTime
Sleep
version
GetFileVersionInfoA
VerQueryValueA
VerLanguageNameA
GetFileVersionInfoSizeA
shell32
DragFinish
SHGetPathFromIDListA
oleaut32
LoadTypeLi
Sections
.text Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 260KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ