Static task
static1
Behavioral task
behavioral1
Sample
91747c9f50cb420158127d8bf020408dca8e006518eb4bbd409fb82a9ae0256a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
91747c9f50cb420158127d8bf020408dca8e006518eb4bbd409fb82a9ae0256a.exe
Resource
win10v2004-20220812-en
General
-
Target
91747c9f50cb420158127d8bf020408dca8e006518eb4bbd409fb82a9ae0256a
-
Size
556KB
-
MD5
e0e01a228bb67349349711718c44c680
-
SHA1
5837cc89801ab50380e1c69b6559bb58b4176b11
-
SHA256
91747c9f50cb420158127d8bf020408dca8e006518eb4bbd409fb82a9ae0256a
-
SHA512
1876cd24af24a80530c266548170fa1ae1b2ec903b667dcb0c728f23340c8e9d8faf2e659c53432f4e282bda247249a5b51ebc0772d413ff2522b34d9a575c6c
-
SSDEEP
12288:o2ZLrBlcxwK3/VZYtX5m4YtUdf6w6O+IqO8:vLrBlcxHPVunE6TJ
Malware Config
Signatures
Files
-
91747c9f50cb420158127d8bf020408dca8e006518eb4bbd409fb82a9ae0256a.exe windows x86
ab7dc19495063a7c1c3c9b4c3f3c928a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
TranslateMessage
ToAsciiEx
IsWindowVisible
DefDlgProcA
DestroyWindow
SetWindowLongW
EnumThreadWindows
GetAltTabInfo
SetRect
CreateWindowExW
ReuseDDElParam
GetNextDlgGroupItem
RegisterClassA
InvalidateRect
RegisterClassExA
CharToOemA
GetWindowLongA
DrawTextExW
SetPropW
IsCharLowerA
DlgDirSelectExW
DlgDirSelectComboBoxExW
DefWindowProcW
MessageBoxA
ShowWindow
kernel32
SetConsoleCtrlHandler
HeapDestroy
SetLastError
CreateMutexA
GetSystemTimeAsFileTime
TlsSetValue
GetFileType
LCMapStringW
GetLastError
GetConsoleCursorInfo
GetNumberFormatW
WideCharToMultiByte
IsValidCodePage
GetEnvironmentStringsW
GetLocalTime
GetCurrentProcess
LCMapStringA
OpenWaitableTimerW
WriteConsoleW
GetOEMCP
GetCommandLineW
FindNextFileA
FreeEnvironmentStringsA
GetStartupInfoA
Sleep
SetUnhandledExceptionFilter
GetTimeFormatA
InterlockedExchange
TlsGetValue
TlsAlloc
DeleteCriticalSection
SetFilePointer
CompareStringA
QueryPerformanceCounter
OpenMutexW
GetCommandLineA
InterlockedDecrement
CreatePipe
GetConsoleOutputCP
IsValidLocale
InterlockedIncrement
GetProcAddress
LoadLibraryA
SetStdHandle
GetConsoleCP
GetStringTypeW
HeapReAlloc
VirtualAlloc
MoveFileExW
GetEnvironmentStrings
FreeLibrary
GetProcessHeap
ReadFile
GetCurrentThreadId
OpenMutexA
HeapFree
InitializeCriticalSection
GetVersionExA
HeapSize
GetConsoleMode
GetModuleFileNameA
MultiByteToWideChar
GetACP
EnterCriticalSection
VirtualQuery
UnhandledExceptionFilter
GetStdHandle
SetHandleCount
GetTimeZoneInformation
GetCPInfo
IsDebuggerPresent
VirtualFree
DeleteAtom
GetDateFormatA
TerminateProcess
GetUserDefaultLCID
GetCurrentThread
CompareStringW
HeapAlloc
GetModuleHandleA
WaitNamedPipeA
SetVolumeLabelA
GetLocaleInfoW
GetSystemDirectoryW
GetNamedPipeInfo
GetLocaleInfoA
RtlMoveMemory
lstrcpyA
HeapCreate
CloseHandle
AllocConsole
WriteFile
FreeEnvironmentStringsW
LeaveCriticalSection
TlsFree
EnumSystemLocalesA
SetEnvironmentVariableA
GetStartupInfoW
GetCurrentProcessId
GetThreadTimes
CreateFileA
GetTickCount
GetModuleFileNameW
FlushFileBuffers
FindClose
RtlUnwind
LockResource
ExitProcess
GetStringTypeA
WriteConsoleA
comctl32
DrawStatusTextW
CreateUpDownControl
ImageList_GetImageRect
ImageList_Duplicate
ImageList_DrawIndirect
ImageList_Add
ImageList_LoadImageW
ImageList_GetDragImage
CreateStatusWindowW
CreatePropertySheetPageA
ImageList_Copy
ImageList_DragEnter
InitCommonControlsEx
CreateStatusWindow
ImageList_GetBkColor
GetEffectiveClientRect
ImageList_LoadImage
ImageList_BeginDrag
Sections
.text Size: 198KB - Virtual size: 198KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 206KB - Virtual size: 236KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 111KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ