Static task
static1
Behavioral task
behavioral1
Sample
457f1f954cb27894b06ac091c81d3a11dd70e2547551ae07fcdfddc802a8c8b4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
457f1f954cb27894b06ac091c81d3a11dd70e2547551ae07fcdfddc802a8c8b4.exe
Resource
win10v2004-20220812-en
General
-
Target
457f1f954cb27894b06ac091c81d3a11dd70e2547551ae07fcdfddc802a8c8b4
-
Size
172KB
-
MD5
d69a32ac7c0710ae3f9c0bb8deb968ad
-
SHA1
cd38dc6d48552d8e7105e2fa8418de808680770b
-
SHA256
457f1f954cb27894b06ac091c81d3a11dd70e2547551ae07fcdfddc802a8c8b4
-
SHA512
9787ae367c89cfc0681ec04a05611f29c705ded6b7ed31f295aac295341f581d5c6bfcc81af0dea643bdb07062202f85ef7379db2e232b9ee369fe2bfa578471
-
SSDEEP
3072:GQO/R+SMa4zKXTufsuZKbDtLRA4Mbv5si9L:6+SazKXyfDKB1jI
Malware Config
Signatures
Files
-
457f1f954cb27894b06ac091c81d3a11dd70e2547551ae07fcdfddc802a8c8b4.exe windows x86
8aa0f87852a012825b3de6c624ae2e77
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
WideCharToMultiByte
GetComputerNameW
UnlockFile
WriteFile
LockFile
SetFilePointer
DebugSetProcessKillOnExit
FoldStringA
DeleteFileW
MoveFileW
GetDiskFreeSpaceExA
GetCurrentThread
DeleteTimerQueueTimer
ReadConsoleOutputAttribute
GetVolumePathNamesForVolumeNameW
ConnectNamedPipe
SetComputerNameExA
DisableThreadLibraryCalls
GetModuleHandleA
ConvertThreadToFiber
GetTimeFormatA
GetProcessHeap
ActivateActCtx
ChangeTimerQueueTimer
GetStartupInfoA
CreateFileW
ReadFile
CloseHandle
FindAtomW
VirtualProtect
GetCalendarInfoW
CreateActCtxW
GetDevicePowerState
GetCurrencyFormatW
GetShortPathNameW
GetLastError
CreateTimerQueue
GetTempFileNameW
GetComputerNameExW
CreateDirectoryA
GetThreadContext
user32
IsCharUpperW
FlashWindowEx
LoadMenuA
GetWindowRgnBox
GetActiveWindow
GetWindowTextLengthA
IsMenu
GetWindowTextW
FindWindowExA
CharLowerW
MessageBoxW
GetWindowRect
AdjustWindowRectEx
GetClipboardOwner
IsChild
GetKeyboardState
GetFocus
GetWindow
IsIconic
LoadIconW
CreateMenu
GetMenuInfo
IsCharLowerW
LoadIconA
RegisterClassA
GetForegroundWindow
IntersectRect
LoadCursorW
gdi32
GetStockObject
advapi32
CryptDuplicateHash
EncryptionDisable
CryptReleaseContext
CryptAcquireContextA
GetUserNameA
CryptGetDefaultProviderW
CryptDestroyHash
CryptCreateHash
imm32
ImmGetCandidateListCountW
ImmRegisterWordA
ImmGetImeMenuItemsW
imgutil
GetMaxMIMEIDBytes
CreateDDrawSurfaceOnDIB
ComputeInvCMAP
IdentifyMIMEType
loadperf
RestorePerfRegistryFromFileW
BackupPerfRegistryToFileW
UpdatePerfNameFilesW
UnloadPerfCounterTextStringsW
SetServiceAsTrustedA
LoadPerfCounterTextStringsW
InstallPerfDllA
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
bIP4Jxw Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_MEM_READ