Static task
static1
Behavioral task
behavioral1
Sample
719563e2e169502b35dccb6b1cca634d000bd797eabbdb4c900f4dd77b2a4644.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
719563e2e169502b35dccb6b1cca634d000bd797eabbdb4c900f4dd77b2a4644.exe
Resource
win10v2004-20220812-en
General
-
Target
719563e2e169502b35dccb6b1cca634d000bd797eabbdb4c900f4dd77b2a4644
-
Size
270KB
-
MD5
ae5b5fd7f9920248471de0b3a4df8ed9
-
SHA1
17f5916337f320d09b82c090cfcac6d7b2688c99
-
SHA256
719563e2e169502b35dccb6b1cca634d000bd797eabbdb4c900f4dd77b2a4644
-
SHA512
1b02ab90b833552d8bd580b402e1e5dbfc4fb1d87119425fa1d5e356c2cb8488a3d90ef1a07a678964da7e952895068471319fe9f5dadc1fba8448e011721894
-
SSDEEP
3072:1fT7SxFA9gv+/diTX0vuW76itEqlh7G6+bRI+BFXMTz6GZAQSUOzH4BOKRA4Tgm7:1GFAOvAd40GW7rtEkKXzNMoQSUN7n
Malware Config
Signatures
Files
-
719563e2e169502b35dccb6b1cca634d000bd797eabbdb4c900f4dd77b2a4644.exe windows x86
fbb76efb4bd1cb0bf03c81e04d83af5d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DialogBoxParamA
GetNextDlgGroupItem
GetAncestor
DestroyWindow
LoadIconA
KillTimer
SetTimer
GetDlgItem
EndDialog
PostMessageA
SendMessageA
MessageBoxW
SetWindowTextW
SetWindowTextA
LoadStringW
LoadStringA
SetWindowLongA
GetWindowLongA
DialogBoxParamW
MapVirtualKeyExA
ShowWindow
CharLowerW
CharLowerA
CharUpperW
CharUpperA
GetCaretBlinkTime
GetFocus
PeekMessageA
RegisterClassW
SystemParametersInfoW
GetSystemMenu
MessageBoxIndirectW
CharNextExA
SetDlgItemTextA
SetClassLongW
SendMessageTimeoutA
TabbedTextOutA
ole32
CoRegisterMessageFilter
CoTaskMemFree
advapi32
RegDeleteValueW
RegEnumValueW
RegOpenKeyA
RegEnumKeyW
RegOpenKeyExW
RegCloseKey
RegDeleteKeyW
RegDeleteValueA
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
RegCreateKeyW
gdi32
Rectangle
SetViewportExtEx
CreateSolidBrush
GetTextFaceA
Escape
SetWindowExtEx
Arc
PatBlt
GetDeviceGammaRamp
GetTextMetricsW
GetBrushOrgEx
PolyBezier
GetTextAlign
SetMapperFlags
CloseFigure
GetClipRgn
GetOutlineTextMetricsA
CreateHatchBrush
PolyPolyline
GetEnhMetaFilePaletteEntries
GetRandomRgn
FillRgn
comctl32
ImageList_Destroy
ImageList_Create
ImageList_AddMasked
kernel32
GetCPInfo
GetOEMCP
IsValidCodePage
HeapSize
LCMapStringW
GetStringTypeA
GetStringTypeW
EnterCriticalSection
HeapFree
HeapReAlloc
HeapCreate
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
SetHandleCount
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSectionAndSpinCount
RtlUnwind
LCMapStringA
CompareStringW
LeaveCriticalSection
CopyFileW
GetFileType
GetThreadPriority
GetWriteWatch
GetEnvironmentVariableA
IsDBCSLeadByte
LocalFree
GetSystemDirectoryW
DosDateTimeToFileTime
WaitForMultipleObjects
DecodePointer
FileTimeToDosDateTime
LockResource
GlobalFlags
FormatMessageA
GetEnvironmentStringsW
SetEnvironmentVariableA
UnmapViewOfFile
GetDiskFreeSpaceW
LocalUnlock
FindFirstFileW
GetVersionExA
GetStdHandle
lstrcpynA
DeleteFileW
FindNextFileW
FindClose
SetFilePointer
MultiByteToWideChar
ReadFile
WriteFile
MulDiv
lstrlenA
WideCharToMultiByte
GetPrivateProfileStringW
WritePrivateProfileStringW
FreeLibrary
LoadLibraryExW
GetModuleHandleW
GlobalFree
GetExitCodeProcess
WaitForSingleObject
GlobalAlloc
ExpandEnvironmentStringsW
GetTempFileNameW
lstrcmpiA
CreateProcessW
LoadLibraryW
CreateThread
GlobalLock
GlobalUnlock
lstrcpynW
lstrlenW
CloseHandle
SetErrorMode
GetCommandLineW
GetTempPathW
GetWindowsDirectoryW
ExitProcess
GetCurrentProcess
GetModuleFileNameW
GetFileSize
CreateFileW
GetTickCount
Sleep
SetFileAttributesW
CreateDirectoryW
GetLastError
GetFileAttributesW
SetCurrentDirectoryW
MoveFileW
GetFullPathNameW
GetShortPathNameW
SearchPathW
CompareFileTime
SetFileTime
CompareStringA
CopyFileA
CreateDirectoryA
CreateEventA
CreateFileA
CreateFileMappingA
CreateMutexA
CreateNamedPipeA
CreateProcessA
DeleteFileA
DeviceIoControl
FileTimeToLocalFileTime
FileTimeToSystemTime
FindFirstFileA
FindNextFileA
FindResourceA
FlushFileBuffers
FreeResource
GetACP
GetCommandLineA
GetComputerNameA
GetCurrentDirectoryA
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDiskFreeSpaceA
GetDriveTypeA
GetFileAttributesA
GetFullPathNameA
GetLocalTime
GetLocaleInfoA
GetLogicalDrives
GetModuleFileNameA
GetModuleHandleA
GetOverlappedResult
GetPrivateProfileStringA
GetProcAddress
GetProfileStringA
GetShortPathNameA
GetSystemDefaultLCID
GetSystemDirectoryA
GetSystemInfo
GetSystemTimeAsFileTime
GetUserDefaultLangID
GetVersion
GetWindowsDirectoryA
GlobalAddAtomA
GlobalDeleteAtom
GlobalHandle
GlobalReAlloc
IsBadWritePtr
LoadLibraryA
LoadLibraryExA
LoadResource
LocalFileTimeToFileTime
MapViewOfFile
MoveFileA
MoveFileExA
OpenMutexA
OpenProcess
QueryPerformanceCounter
ReleaseMutex
RemoveDirectoryA
SetCurrentDirectoryA
SetEndOfFile
SetFileAttributesA
SetLastError
SetNamedPipeHandleState
SizeofResource
TerminateProcess
TerminateThread
TransactNamedPipe
VirtualAlloc
VirtualFree
WritePrivateProfileStringA
WriteProfileStringA
lstrcmpA
HeapAlloc
GetStartupInfoA
DeleteCriticalSection
Sections
.text Size: 150KB - Virtual size: 149KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ