Static task
static1
Behavioral task
behavioral1
Sample
5841665cbdb1b7dfb3d8a035b8408dcef997c8cb1238d1cf3b685430a565f8b7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5841665cbdb1b7dfb3d8a035b8408dcef997c8cb1238d1cf3b685430a565f8b7.exe
Resource
win10v2004-20220901-en
General
-
Target
5841665cbdb1b7dfb3d8a035b8408dcef997c8cb1238d1cf3b685430a565f8b7
-
Size
486KB
-
MD5
fe3b91db1d3d3816f6c995bfcbd77a1c
-
SHA1
ea197b8e0d50451038ff1438bee9caaa72d14d92
-
SHA256
5841665cbdb1b7dfb3d8a035b8408dcef997c8cb1238d1cf3b685430a565f8b7
-
SHA512
c51e7a5b9694ea5118143024a2b029fdea946203e1c970c877c4cd57c4e63b122ab78e32033fe1cb2f8251225ac2cde16a8d7fa622e445e9cf19482a9417921e
-
SSDEEP
12288:HZrYYw4bOcFVff2RzdPsObYf077fUplENx4nZ57379U7r9F:5LrbOc/nIzdEH0UANx4nrQ
Malware Config
Signatures
Files
-
5841665cbdb1b7dfb3d8a035b8408dcef997c8cb1238d1cf3b685430a565f8b7.exe windows x86
64306fd775296808e62d3ed6aa4e4df5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
IntersectClipRect
SetTextColor
GetCharWidthW
CreatePolyPolygonRgn
GetClipBox
ExtFloodFill
PolylineTo
FillPath
CreateDiscardableBitmap
GetEnhMetaFileW
AddFontResourceA
GetAspectRatioFilterEx
CreateFontW
CancelDC
DescribePixelFormat
comctl32
ImageList_Duplicate
ImageList_ReplaceIcon
ImageList_Write
InitCommonControlsEx
ImageList_SetOverlayImage
ImageList_GetImageRect
DrawStatusTextA
ImageList_Draw
ImageList_Replace
ImageList_LoadImage
CreateToolbarEx
ImageList_Remove
ImageList_GetImageInfo
ImageList_SetBkColor
ImageList_DragLeave
ImageList_GetImageCount
ImageList_GetDragImage
CreatePropertySheetPageA
ImageList_LoadImageA
DrawInsert
DrawStatusTextW
ImageList_DragMove
ImageList_GetFlags
kernel32
VirtualAlloc
GetTimeZoneInformation
SetLastError
GetModuleFileNameA
GetSystemTimeAsFileTime
GetCurrentProcess
SetFilePointer
ReadFile
ExitProcess
LCMapStringA
GetFileType
DeleteCriticalSection
GetCPInfo
HeapFree
SleepEx
TlsAlloc
InterlockedExchange
GetCurrentThreadId
LoadLibraryA
HeapReAlloc
CreateMutexA
GetEnvironmentStrings
TlsFree
InterlockedIncrement
GetCommandLineA
OpenMutexA
CloseHandle
GetLocalTime
HeapAlloc
VirtualQuery
ReadConsoleInputW
SetStdHandle
LeaveCriticalSection
GetCurrentProcessId
InitializeCriticalSection
GetCommandLineW
InterlockedDecrement
GetStringTypeA
GetTickCount
GetLastError
SetEnvironmentVariableA
IsBadWritePtr
UnhandledExceptionFilter
QueryPerformanceCounter
GetStdHandle
GetEnvironmentStringsW
HeapDestroy
GetModuleFileNameW
CompareStringW
GetPrivateProfileStringW
FreeEnvironmentStringsA
LCMapStringW
GetProcAddress
WriteFile
GetStartupInfoA
GetStringTypeW
HeapCreate
FreeEnvironmentStringsW
FlushFileBuffers
GetModuleHandleA
VirtualFree
GetStartupInfoW
SetHandleCount
MultiByteToWideChar
TlsSetValue
GetVersion
RtlUnwind
GetCurrentThread
CompareStringA
GetDiskFreeSpaceA
WideCharToMultiByte
GetSystemTime
TerminateProcess
EnterCriticalSection
TlsGetValue
user32
EnumDisplaySettingsExW
MessageBoxW
RegisterClassA
ShowWindow
RegisterClassExA
CreateWindowExW
wininet
FtpSetCurrentDirectoryA
HttpSendRequestA
InternetGetLastResponseInfoW
UnlockUrlCacheEntryFileA
SetUrlCacheEntryGroupW
Sections
.text Size: 323KB - Virtual size: 323KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ