Static task
static1
Behavioral task
behavioral1
Sample
c4a23174881845bd338cb1a6f55d601338228337bd785d4108a0163b6eb61219.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c4a23174881845bd338cb1a6f55d601338228337bd785d4108a0163b6eb61219.exe
Resource
win10v2004-20220812-en
General
-
Target
c4a23174881845bd338cb1a6f55d601338228337bd785d4108a0163b6eb61219
-
Size
4.3MB
-
MD5
0d90c249c8d5a57e59ce46d3bd6b2c5c
-
SHA1
077199dd4e81124bd9774a2aa1b28abac1caa73c
-
SHA256
c4a23174881845bd338cb1a6f55d601338228337bd785d4108a0163b6eb61219
-
SHA512
f5c138b143fd5ca048f308feca8644bf8f72f1601897f56b99f8b26e608865114dec7ce305520425c6b460dbe91e375c8f05a45968da67d5d461539f1647f9cd
-
SSDEEP
12288:b4I/JLBmdkPBNwdTYTGC9K5RBIj3/bNi+PAi1DshCv695yVzBb4mHOKR:cI/bmdkPSYg27T8Qgc85yhBb4mHzR
Malware Config
Signatures
Files
-
c4a23174881845bd338cb1a6f55d601338228337bd785d4108a0163b6eb61219.exe windows x86
e38cf1d20e56e55da66ebb3cb96ce7fa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsProcessorFeaturePresent
GetProcessHeap
GetModuleHandleA
GetVersion
SetLastError
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleFileNameW
WideCharToMultiByte
LockResource
FindResourceExW
GetSystemDirectoryW
GetTempPathW
GetComputerNameW
GetModuleFileNameA
GetNativeSystemInfo
LoadLibraryA
GetCommandLineW
VirtualAlloc
VirtualFree
OpenEventW
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
InitializeCriticalSectionAndSpinCount
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetSystemTimeAsFileTime
GetTickCount
CreateMutexA
CloseHandle
OpenMutexA
WaitForSingleObject
OpenMutexW
Sleep
RaiseException
GetCurrentThreadId
lstrcmpiW
GetModuleHandleW
GetProcAddress
InterlockedDecrement
InterlockedIncrement
GetLastError
lstrlenW
GetCurrentProcess
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStdHandle
WriteFile
ExitProcess
EnterCriticalSection
HeapFree
HeapAlloc
HeapDestroy
HeapReAlloc
HeapSize
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualProtect
GetSystemInfo
VirtualQuery
GetStartupInfoW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapCreate
user32
CharNextW
DefWindowProcW
DestroyWindow
GetDC
GetWindowDC
ReleaseDC
GetSysColorBrush
GetSystemMetrics
GetForegroundWindow
UnregisterClassA
gdi32
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
Rectangle
Ellipse
DeleteObject
DeleteDC
GetDCBrushColor
MoveToEx
CreateSolidBrush
CreatePen
advapi32
RegSetValueExW
RegDeleteValueW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
ole32
CoCreateInstance
CoTaskMemFree
CoUninitialize
CoInitialize
CoTaskMemRealloc
CoTaskMemAlloc
oleaut32
VarUI4FromStr
comctl32
InitCommonControlsEx
Sections
.text Size: 330KB - Virtual size: 329KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 294KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ