Static task
static1
Behavioral task
behavioral1
Sample
47762c9eeafe6b40fd687d709442ae04be586bcdca495a78818e9cc8a0cf554a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
47762c9eeafe6b40fd687d709442ae04be586bcdca495a78818e9cc8a0cf554a.exe
Resource
win10v2004-20220812-en
General
-
Target
47762c9eeafe6b40fd687d709442ae04be586bcdca495a78818e9cc8a0cf554a
-
Size
656KB
-
MD5
518f53dc828e304c655d203729a3463f
-
SHA1
518a02594bebaa02b4730eb0442b8ab912fd5478
-
SHA256
47762c9eeafe6b40fd687d709442ae04be586bcdca495a78818e9cc8a0cf554a
-
SHA512
08e0a2a410e08bcabea66ab504c4624b048a60caf204ab4c683aec6b7334af8cea9a83fd45bff1c1ec930319bc5a90bd4c9d684e172465a345361f1f59418cbc
-
SSDEEP
12288:HXFeKD9R6W+QtmdifxqPsZ7JgT4CK/8KmuXcRRZSX5nX2bMN5C:HEKpR6W9mdiZqPsZ7qT4d/8KmuX+RZST
Malware Config
Signatures
Files
-
47762c9eeafe6b40fd687d709442ae04be586bcdca495a78818e9cc8a0cf554a.exe windows x86
dfbbe35f962036a5560e2191a1c66bd3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteW
SHGetMalloc
SHFileOperationW
SHGetFileInfoW
winmm
waveOutUnprepareHeader
mciSendCommandA
waveOutGetPosition
waveOutGetVolume
comctl32
InitCommonControlsEx
ord17
user32
BeginDeferWindowPos
SetCapture
SetWindowRgn
OpenClipboard
CreateDialogIndirectParamA
IsIconic
EndPaint
SetWindowTextA
SetCursor
SetFocus
TrackPopupMenuEx
SetRectEmpty
GetParent
GetMenuItemInfoA
ShowCaret
GetMenuStringA
GetKeyState
SetMenuDefaultItem
SetDlgItemTextA
CharLowerA
GetMenu
SetWindowsHookExA
IsWindow
ReleaseDC
GetDlgItem
WindowFromPoint
CopyRect
HideCaret
CreateWindowExA
EndDeferWindowPos
GetClientRect
GetActiveWindow
ScrollWindowEx
SystemParametersInfoA
CopyAcceleratorTableA
DestroyMenu
TranslateMessage
IsRectEmpty
SendMessageA
IsChild
GetDesktopWindow
InflateRect
DrawStateA
GetCursorPos
GetSysColorBrush
CloseClipboard
EnableMenuItem
GetSystemMetrics
RegisterClassExA
IntersectRect
GetWindowTextLengthA
RemoveMenu
ExitWindowsEx
IsWindowEnabled
ShowWindow
GetWindow
GetMenuItemCount
GetWindowThreadProcessId
LoadAcceleratorsA
BeginPaint
UpdateWindow
ShowScrollBar
IsWindowVisible
GetNextDlgTabItem
GetSubMenu
CallWindowProcA
GetWindowRect
LoadIconA
GetWindowLongA
SetRect
SetDlgItemInt
EndDialog
LoadCursorA
MessageBoxA
EqualRect
SetWindowContextHelpId
RegisterClassA
OffsetRect
CharUpperA
GetCapture
TabbedTextOutA
GetSysColor
InvalidateRect
GetScrollPos
GetTopWindow
DefWindowProcA
SetScrollRange
ReuseDDElParam
SetWindowPos
CreatePopupMenu
GetClassInfoExA
LoadMenuA
KillTimer
GetMenuCheckMarkDimensions
MsgWaitForMultipleObjects
PeekMessageA
DestroyWindow
SetMenu
MessageBeep
LoadBitmapA
SendDlgItemMessageA
PostMessageA
GetClassNameA
ClientToScreen
LoadStringA
GetMenuState
DispatchMessageA
ReleaseCapture
PtInRect
DrawFrameControl
GetDC
InvalidateRgn
GetPropA
SetTimer
ScreenToClient
RegisterWindowMessageA
SetPropA
AppendMenuA
SetScrollPos
WinHelpA
MoveWindow
GetDlgItemInt
FillRect
PostQuitMessage
kernel32
LCMapStringA
GetModuleFileNameA
CreateFileA
HeapAlloc
CompareStringW
GetTickCount
InterlockedIncrement
GetTimeZoneInformation
GetConsoleCP
WriteConsoleA
OutputDebugStringA
FatalAppExitA
InterlockedDecrement
CloseHandle
HeapDestroy
GetUserDefaultLCID
LoadLibraryW
TerminateProcess
GetVersionExA
InitializeCriticalSection
SetLastError
UnhandledExceptionFilter
HeapValidate
SetStdHandle
GetCurrentThreadId
VirtualQuery
FreeEnvironmentStringsA
SetEnvironmentVariableA
DebugBreak
GetStringTypeA
GetEnvironmentStringsW
MultiByteToWideChar
GetCurrentProcess
LeaveCriticalSection
VirtualFree
GetEnvironmentStrings
GetCPInfo
SetHandleCount
lstrcpyA
GetCurrentThread
GetOEMCP
ReadFile
IsValidLocale
GetStringTypeW
lstrlenA
DeleteCriticalSection
IsBadReadPtr
GetProcessHeap
FreeEnvironmentStringsW
QueryPerformanceCounter
EnumSystemLocalesA
RaiseException
GetConsoleOutputCP
OpenMutexA
GetStartupInfoA
TlsAlloc
IsDebuggerPresent
GetSystemTimeAsFileTime
IsValidCodePage
RtlUnwind
CreateMutexA
GetTimeFormatA
FreeLibrary
GetConsoleMode
GetModuleFileNameW
GetACP
WideCharToMultiByte
GetCommandLineA
WriteConsoleW
SetFilePointer
HeapCreate
CompareStringA
LoadLibraryA
FlushFileBuffers
GetLastError
InterlockedExchange
LCMapStringW
GetLocaleInfoW
VirtualAlloc
GetLocaleInfoA
TlsGetValue
SetUnhandledExceptionFilter
ExitProcess
OutputDebugStringW
GetCurrentProcessId
GetDateFormatA
HeapFree
GetFileType
GetModuleHandleA
EnterCriticalSection
TlsFree
HeapReAlloc
TlsSetValue
SetConsoleCtrlHandler
WriteFile
GetProcAddress
GetStdHandle
Sections
.text Size: 220KB - Virtual size: 219KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 296KB - Virtual size: 292KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 64KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ