Static task
static1
Behavioral task
behavioral1
Sample
4279c539f43b233ca49f0deebf614d28bb82421f1855bc00495fbdfd648e7df6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4279c539f43b233ca49f0deebf614d28bb82421f1855bc00495fbdfd648e7df6.exe
Resource
win10v2004-20220812-en
General
-
Target
4279c539f43b233ca49f0deebf614d28bb82421f1855bc00495fbdfd648e7df6
-
Size
369KB
-
MD5
0d67a7bf67aecaa46a6ed0bd60970b80
-
SHA1
b378581a76052aa7672767d3d7f3eea2f1abe86d
-
SHA256
4279c539f43b233ca49f0deebf614d28bb82421f1855bc00495fbdfd648e7df6
-
SHA512
59262b0dd85c685cd12e6fa6e943e80c575a44eeebd2a7fc8245c9211c5a7cde30423e6538768a1ed6ec0d05c93a4305e52c14b38f51a9787de704788dd25360
-
SSDEEP
6144:EGjEx3YwKP/7JZQdCPxtOvmTB58B7sXBgjAtsuyeC2iZBm:EGghYwQzJkWDOvmTjo+yeCV
Malware Config
Signatures
Files
-
4279c539f43b233ca49f0deebf614d28bb82421f1855bc00495fbdfd648e7df6.exe windows x86
b86ebb6ced8879900a73c20059e94463
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocaleInfoA
GetStringTypeA
GetCPInfo
lstrcpynA
FreeLibrary
LoadResource
CreateProcessW
HeapAlloc
SetUnhandledExceptionFilter
LoadLibraryExW
GetCurrentProcess
QueryPerformanceCounter
HeapFree
GetEnvironmentStringsW
WaitForSingleObject
SetEvent
GetModuleHandleW
GetTickCount
VirtualFree
WriteFile
GetCommandLineA
SetHandleCount
TlsSetValue
GetEnvironmentStrings
GetConsoleCP
WideCharToMultiByte
Sleep
CreateEventA
HeapDestroy
LeaveCriticalSection
GetFileAttributesA
HeapCreate
GetFileAttributesW
TerminateProcess
FileTimeToSystemTime
ReadFile
GetModuleFileNameW
GetTimeZoneInformation
CreateFileW
GetEnvironmentVariableA
CompareStringW
GetACP
MultiByteToWideChar
lstrlenW
FlushFileBuffers
RaiseException
GetStartupInfoA
GetStdHandle
GetLastError
SetLastError
lstrcmpiA
GetThreadLocale
GetProcAddress
VirtualAlloc
HeapSize
EnterCriticalSection
FindClose
WriteConsoleA
UnhandledExceptionFilter
TlsGetValue
LocalAlloc
GetFileType
GetOEMCP
FindNextFileA
GetModuleHandleA
IsDebuggerPresent
FreeEnvironmentStringsW
GetStringTypeW
GetCurrentDirectoryA
CompareStringA
DeleteCriticalSection
GetCurrentThreadId
DuplicateHandle
GetVersionExA
CloseHandle
GetVersion
GetCurrentProcessId
LocalFree
TlsFree
LCMapStringW
DeleteFileA
CreateThread
GetCurrentThread
GetPriorityClass
GetExitCodeProcess
GetProcessVersion
LoadLibraryA
GetProcessId
GetProcessHeap
IsBadReadPtr
VirtualProtect
FindResourceA
SizeofResource
LockResource
LCMapStringA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetLocaleInfoW
WriteConsoleW
GetConsoleOutputCP
IsValidCodePage
SetEndOfFile
GetSystemTimeAsFileTime
FreeEnvironmentStringsA
InitializeCriticalSectionAndSpinCount
InterlockedExchange
SetConsoleCtrlHandler
RtlUnwind
GetConsoleMode
InterlockedDecrement
InterlockedIncrement
TlsAlloc
SetStdHandle
GetModuleFileNameA
FatalAppExitA
HeapReAlloc
lstrlenA
SetFilePointer
FindFirstFileW
CreateFileA
CreateFileMappingA
ExitProcess
SetEnvironmentVariableA
user32
CreateWindowExA
DestroyWindow
SetCursor
GetMessageA
PostQuitMessage
SetCapture
GetSubMenu
SetForegroundWindow
IsWindowEnabled
SetFocus
SendMessageA
SetWindowLongA
MessageBoxA
InvalidateRect
ReleaseDC
EnableMenuItem
GetDlgItem
DefWindowProcA
GetDesktopWindow
GetSysColor
SetWindowPos
GetCursorPos
IsWindow
IsWindowVisible
LoadCursorA
TranslateMessage
PeekMessageA
DispatchMessageA
gdi32
DeleteObject
SetBkMode
GetDeviceCaps
SetTextColor
SelectObject
Sections
.text Size: 187KB - Virtual size: 186KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 131KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ