Static task
static1
Behavioral task
behavioral1
Sample
42d0235a7a9ab44c8fc5e9f3decb9e2eed0f6def1d0864a9f969e4ee058ef0c3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
42d0235a7a9ab44c8fc5e9f3decb9e2eed0f6def1d0864a9f969e4ee058ef0c3.exe
Resource
win10v2004-20220901-en
General
-
Target
42d0235a7a9ab44c8fc5e9f3decb9e2eed0f6def1d0864a9f969e4ee058ef0c3
-
Size
184KB
-
MD5
76cbfcb2d4f3bc2e79ad32141fcd09be
-
SHA1
6821fcd46e112494f2264bfe934383e5871be388
-
SHA256
42d0235a7a9ab44c8fc5e9f3decb9e2eed0f6def1d0864a9f969e4ee058ef0c3
-
SHA512
cf0deb093d4e8c75c3ac73e5c88455481f5a3ea3a441b95c8277f4e0f121bcf81abfdd04e178606d53c1b6554e2cf1d412ff10a6c0b0a3f1cb79e4e17c650254
-
SSDEEP
3072:eS39kXc5QPpfbvPflDJ9rKLS+quOZULIPvrOWjH0I7oJhgkr78ERCSm8:eS3n5QPpz3nBKLTq5LOk0w0gA
Malware Config
Signatures
Files
-
42d0235a7a9ab44c8fc5e9f3decb9e2eed0f6def1d0864a9f969e4ee058ef0c3.exe windows x86
0e09601e25aa74dd18e4c940507051a8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegLoadKeyA
kernel32
VirtualAlloc
GetACP
GetLastError
LocalReAlloc
SetThreadLocale
GetModuleHandleA
GetCommandLineA
LocalAlloc
InitializeCriticalSection
ExitProcess
lstrcmpiA
GetFileAttributesA
GetProcAddress
LoadLibraryA
GetLocalTime
Sleep
ReadFile
lstrcpynA
GetModuleFileNameA
comdlg32
GetSaveFileNameA
GetOpenFileNameA
FindTextA
gdi32
GetCurrentPositionEx
version
VerInstallFileA
VerQueryValueA
VerFindFileA
ole32
CreateOleAdviseHolder
ReleaseStgMedium
user32
IsRectEmpty
BeginPaint
InsertMenuA
IsChild
RegisterClipboardFormatA
DrawMenuBar
GetMenuStringA
CharLowerBuffA
GetActiveWindow
DrawEdge
EmptyClipboard
EnableScrollBar
GetClipboardData
RegisterWindowMessageA
ShowScrollBar
GetKeyState
GetClassLongA
GetClassNameA
DrawIconEx
OpenClipboard
DeleteMenu
WindowFromPoint
GetCursorPos
CharToOemA
GetDlgItem
GetSystemMetrics
CharNextA
GetSysColor
UnhookWindowsHookEx
MapWindowPoints
GetMenu
DestroyMenu
EnableWindow
wsprintfA
CheckMenuItem
TranslateMessage
DefWindowProcA
GetWindowDC
GetScrollRange
EnableMenuItem
SetWindowTextA
SetScrollRange
GetMenuItemID
CreateMenu
OffsetRect
SetActiveWindow
GetWindowPlacement
GetLastActivePopup
MapVirtualKeyA
IsWindowVisible
GetDC
PeekMessageA
WaitMessage
SetScrollPos
GetDesktopWindow
TranslateMDISysAccel
DispatchMessageA
PeekMessageW
GetIconInfo
GetClassInfoA
GetSysColorBrush
GetClientRect
IsWindowUnicode
ScreenToClient
DestroyIcon
GetPropA
DrawAnimatedRects
LoadCursorA
EqualRect
MessageBoxA
DrawIcon
GetParent
GetScrollPos
GetCursor
CreateWindowExA
ReleaseCapture
SetWindowPos
SendMessageA
SetScrollInfo
CallNextHookEx
GetWindowLongW
AdjustWindowRectEx
IsDialogMessageW
GetFocus
SetForegroundWindow
SetWindowLongW
GetTopWindow
DispatchMessageW
IsWindow
SetRect
SetClipboardData
LoadIconA
RemovePropA
UpdateWindow
GetKeyboardType
GetKeyNameTextA
RedrawWindow
FrameRect
GetMenuItemCount
CreatePopupMenu
FindWindowA
CharNextW
EnumThreadWindows
GetWindowThreadProcessId
InsertMenuItemA
GetKeyboardLayoutNameA
MessageBeep
InvalidateRect
ReleaseDC
GetDCEx
EnumWindows
SetWindowsHookExA
SetCapture
OemToCharA
EndPaint
ClientToScreen
InflateRect
IsZoomed
CloseClipboard
GetMenuItemInfoA
SendMessageW
GetKeyboardLayout
SetParent
GetWindow
GetKeyboardState
DrawFrameControl
MoveWindow
GetWindowTextA
DestroyCursor
LoadBitmapA
SetWindowLongA
DefMDIChildProcA
CreateIcon
GetMenuState
TrackPopupMenu
CallWindowProcA
IsWindowEnabled
PostQuitMessage
MsgWaitForMultipleObjects
GetScrollInfo
SetCursor
ScrollWindow
GetWindowRect
SystemParametersInfoA
GetKeyboardLayoutList
DefFrameProcA
CharUpperBuffA
DestroyWindow
ChildWindowFromPoint
SetWindowPlacement
IsDialogMessageA
ActivateKeyboardLayout
GetCapture
GetSubMenu
SetTimer
SetPropA
SetMenu
RegisterClassA
CharLowerA
PostMessageA
SetFocus
UnregisterClassA
DrawTextA
EnumChildWindows
GetSystemMenu
LoadKeyboardLayoutA
GetForegroundWindow
SetMenuItemInfoA
RemoveMenu
KillTimer
FillRect
shell32
SHGetDiskFreeSpaceA
SHGetFileInfoA
SHGetDesktopFolder
DragQueryFileA
SHGetFolderPathA
Sections
CODE Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 140KB - Virtual size: 139KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 3KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 1024B - Virtual size: 539B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ