Static task
static1
Behavioral task
behavioral1
Sample
02fd2a919a7c7f9304db303550625c2887c038339bca3bd1447911d0e003b823.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
02fd2a919a7c7f9304db303550625c2887c038339bca3bd1447911d0e003b823.exe
Resource
win10v2004-20220812-en
General
-
Target
02fd2a919a7c7f9304db303550625c2887c038339bca3bd1447911d0e003b823
-
Size
192KB
-
MD5
04c5d51baeb42dc218aa69574a4fcdd7
-
SHA1
499e19ad0e7cb900ddbb9181f89de69658bfc2b4
-
SHA256
02fd2a919a7c7f9304db303550625c2887c038339bca3bd1447911d0e003b823
-
SHA512
c7d049290739d04d1f904ee73ecd5b716caa465abffe66b561a49524b9182e97081ddc714b91e71c3e6c73dcf9a8e208eab6712eede4e16132f0123d4e4ba17c
-
SSDEEP
1536:do7pfD6IPlkij1ckrQ0rXOuU0rgDxd2mx0VqQMZL0oNIp:m7lPyixvEqJrCxd2mx08RZQoNIp
Malware Config
Signatures
Files
-
02fd2a919a7c7f9304db303550625c2887c038339bca3bd1447911d0e003b823.exe windows x86
57fefe8566ecfab2cea3e73096e3daf7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42u
ord4430
ord2640
ord2047
ord6372
ord3744
ord5059
ord1720
ord2437
ord2116
ord5273
ord2977
ord3142
ord3254
ord4459
ord3131
ord3257
ord2980
ord3076
ord2971
ord3825
ord3826
ord3820
ord3074
ord4075
ord4621
ord4421
ord401
ord825
ord674
ord5250
ord5092
ord4613
ord4608
ord4607
ord1822
ord1817
ord6195
ord6408
ord3867
ord3792
ord800
ord4155
ord540
ord535
ord858
ord4273
ord3871
ord925
ord3614
ord2392
ord5055
ord4583
ord4580
ord4891
ord4362
ord4526
ord5070
ord4335
ord4343
ord4717
ord4880
ord4525
ord4539
ord4537
ord4520
ord4523
ord4518
ord4958
ord4955
ord4103
ord4073
ord5236
ord2377
ord5286
ord4435
ord3743
ord5247
ord2438
ord4426
ord5813
ord344
ord3621
ord3658
ord2406
ord657
ord4234
ord1634
ord4449
ord1716
ord5261
ord4369
ord4846
ord4992
ord2508
ord6048
ord1767
ord5237
ord5276
ord5257
ord4419
ord3615
ord641
ord361
ord2527
ord1264
ord1196
ord4310
ord6404
ord1252
ord5436
ord1258
ord4690
ord3053
ord3060
ord6332
ord2502
ord2534
ord5239
ord1739
ord5573
ord3167
ord5649
ord4414
ord4817
ord2391
ord4381
ord3449
ord3193
ord6076
ord4617
ord4420
ord338
ord652
ord4233
ord5736
ord6171
ord861
ord665
ord6381
ord1971
ord5438
ord3313
ord353
ord4947
ord4852
ord5949
ord1137
ord4704
ord4224
ord6065
ord6063
ord1165
ord6330
ord2371
ord2644
ord6306
ord4165
ord1662
ord2911
ord3023
ord2082
ord357
ord3760
ord6211
ord2859
ord3450
ord764
ord826
ord260
ord824
ord538
ord4370
ord2506
ord4831
ord324
ord2362
ord4229
ord1197
ord4847
ord1826
ord4710
ord4744
ord5010
ord2507
ord4828
ord3605
ord3397
ord4418
ord3716
ord795
ord656
ord567
ord355
ord940
ord922
ord537
ord3092
ord4124
ord5679
ord3172
ord2855
ord6871
ord3087
ord4602
ord4629
ord3494
ord1191
ord3559
ord3290
ord6150
ord2522
ord4360
ord4051
ord5467
ord4116
ord2381
ord5080
ord5230
ord6365
ord5275
ord5058
ord5244
ord2436
ord3725
ord554
ord807
ord6617
ord4263
ord816
ord4018
ord2706
ord562
ord2745
ord1125
ord2558
ord4071
ord1709
ord1711
ord1708
ord860
ord5706
ord4442
ord4665
ord4670
ord1851
ord4241
ord3864
ord2119
ord2383
ord5096
ord5099
ord4462
ord3345
ord975
ord2875
ord4148
ord2375
ord5280
ord4431
ord4422
ord529
ord402
ord796
ord2486
ord2619
ord2618
ord5867
ord5996
ord2109
ord4158
ord4451
ord5251
ord6379
ord5446
ord6390
ord2281
ord1771
ord2634
ord5977
ord4050
ord2755
ord4606
ord4604
ord4269
ord6371
ord4480
ord2546
ord2504
ord5727
ord3917
ord1089
ord2388
ord3341
ord5296
ord5298
ord4074
ord4692
ord5303
ord5285
ord5710
ord4616
ord3733
ord561
ord815
ord986
ord411
ord4154
ord2613
ord1190
ord6113
ord668
ord2762
ord356
ord2717
ord1148
ord5193
ord1143
ord5769
ord2756
ord1937
ord4268
ord4582
ord4893
ord4364
ord4886
ord4884
ord1719
ord813
ord2858
ord560
ord5256
ord5871
ord6125
ord6126
ord4219
ord2854
ord4688
ord5764
ord3749
ord3751
ord5142
ord283
ord2559
ord472
ord927
ord3793
ord1658
ord2641
ord5279
ord4347
ord6370
ord5157
ord2374
ord5233
ord4401
ord1768
ord4072
ord6051
ord4147
ord2873
ord2874
ord3398
ord5468
ord976
ord5006
ord3346
ord4298
ord4461
ord5098
ord5094
ord3054
ord2382
ord2715
ord2093
ord5095
ord4240
ord1850
ord3592
ord823
ord1569
msvcrt
_controlfp
_onexit
__dllonexit
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_wcmdln
exit
_XcptFilter
_exit
_wtoi
__CxxFrameHandler
memmove
_itow
wcscmp
wcscpy
wcscat
wcslen
_wcsicmp
_wcsdup
atoi
kernel32
WideCharToMultiByte
lstrcpynW
lstrcmpW
lstrcpyW
LoadLibraryW
GetModuleHandleW
GetStartupInfoW
GetCurrentDirectoryW
lstrlenW
lstrcmpiW
LocalFree
LocalUnlock
LocalLock
GetProcAddress
LoadLibraryA
GetFullPathNameW
MultiByteToWideChar
LocalAlloc
user32
GetDC
UpdateWindow
LoadIconW
MessageBeep
GetMenuItemRect
GetMenu
FillRect
InflateRect
ReleaseDC
SetRectEmpty
OffsetRect
GetDlgCtrlID
SetWindowPos
GetWindowRect
GetParent
EnableWindow
FrameRect
GetSystemMetrics
SetActiveWindow
InvalidateRect
SendMessageW
RegisterWindowMessageW
GetClientRect
gdi32
CreateFontIndirectW
advapi32
RegOpenKeyExA
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
RegQueryValueExA
shell32
ShellExecuteW
Sections
.text Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rmnet Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rmnet Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE