Static task
static1
Behavioral task
behavioral1
Sample
5fbc0c42c846980958fc7f83118163679eedf29b6d876ee3aa1a2bf58a90294e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5fbc0c42c846980958fc7f83118163679eedf29b6d876ee3aa1a2bf58a90294e.exe
Resource
win10v2004-20220812-en
General
-
Target
5fbc0c42c846980958fc7f83118163679eedf29b6d876ee3aa1a2bf58a90294e
-
Size
668KB
-
MD5
8422faba40a6c629691c0538b5198e92
-
SHA1
db24127489fc04d1a66c40ff85cff553bcb571de
-
SHA256
5fbc0c42c846980958fc7f83118163679eedf29b6d876ee3aa1a2bf58a90294e
-
SHA512
06d97dca8917d504fcf74eb1a3031caa161beaaf2351d4ca160e124dad738fac2ce0aa75e352627017ea0251b40b746d10d6659ef2419bab524d315cc4fe503b
-
SSDEEP
12288:/hlhUYdELBkqBtyz7sAFze1o4vo6GxdLXPbDV2F1VGmuKEkKhJ+Pbec:/hlrdIBBtG7LqadzPvgsKEkeAK
Malware Config
Signatures
Files
-
5fbc0c42c846980958fc7f83118163679eedf29b6d876ee3aa1a2bf58a90294e.exe windows x86
da2a6f3e923ff6cb6c8cd57e2f10bf9a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowDC
GetWindowLongW
GetWindowRgn
WinHelpW
GetSystemMenu
CopyAcceleratorTableW
DestroyMenu
ShowWindow
MessageBeep
LoadCursorW
ShowScrollBar
TranslateMessage
EndPaint
MoveWindow
IsWindow
GetCapture
InflateRect
GetScrollInfo
LoadAcceleratorsW
EqualRect
OffsetRect
MapWindowPoints
SetDlgItemTextW
DrawIconEx
CreatePopupMenu
CreateWindowExW
IntersectRect
RegisterClassW
CheckMenuItem
GetClientRect
SetForegroundWindow
IsWindowEnabled
GetMenuState
DefWindowProcW
EndDeferWindowPos
SetTimer
GetDlgCtrlID
EnableWindow
CreateMenu
IsDialogMessageW
IsMenu
WindowFromPoint
ReleaseCapture
SetScrollInfo
ScreenToClient
PostMessageW
LoadImageW
SetFocus
LoadIconW
CharUpperW
MessageBoxW
RegisterClassExW
BeginPaint
BeginDeferWindowPos
GetSysColorBrush
DestroyWindow
GetKeyState
InvalidateRgn
SendDlgItemMessageW
GetWindow
LoadBitmapW
GetWindowPlacement
EndDialog
CloseClipboard
SetRect
FindWindowW
IsWindowVisible
InvalidateRect
PostQuitMessage
GetClassNameW
DestroyIcon
shell32
ord155
DragQueryFileA
DragAcceptFiles
Shell_NotifyIconA
SHGetMalloc
SHGetDesktopFolder
DragFinish
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetFileInfoA
ShellExecuteExA
SHGetPathFromIDListA
advapi32
CloseServiceHandle
RegCloseKey
CreateServiceA
RegCreateKeyExA
DeregisterEventSource
RegOpenKeyExA
RegEnumKeyExA
RegQueryValueExA
OpenSCManagerA
version
GetFileVersionInfoA
VerQueryValueA
rpcrt4
UuidToStringA
RpcStringFreeA
UuidCreate
kernel32
GetProcAddress
GetVersionExW
MultiByteToWideChar
FreeEnvironmentStringsW
SetFilePointer
GetLocaleInfoW
GetSystemDirectoryW
HeapAlloc
TlsSetValue
CompareStringW
LoadLibraryA
HeapFree
EnterCriticalSection
GetVersionExA
CloseHandle
GetStartupInfoW
GetTimeZoneInformation
GetSystemTime
GlobalAlloc
GetEnvironmentStrings
ExitProcess
GetCurrentProcess
LoadLibraryW
CreateMutexW
GetFileType
LCMapStringA
FreeEnvironmentStringsA
SetHandleCount
GetStringTypeA
GetLocalTime
GetTickCount
UnhandledExceptionFilter
GetLastError
WideCharToMultiByte
LCMapStringW
ReadFile
FlushFileBuffers
RtlUnwind
CompareStringA
RaiseException
GetModuleFileNameA
LeaveCriticalSection
SetLastError
VirtualFree
SetEnvironmentVariableA
GetCurrentProcessId
HeapDestroy
TerminateProcess
HeapCreate
InterlockedExchange
InterlockedIncrement
LoadResource
HeapReAlloc
TlsGetValue
LocalFree
IsBadCodePtr
GetModuleFileNameW
GetCPInfo
GetCurrentThreadId
InitializeCriticalSection
FormatMessageW
GetVersion
GetStringTypeW
LocalAlloc
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
SetUnhandledExceptionFilter
VirtualQuery
GetModuleHandleA
GetStartupInfoA
DeleteCriticalSection
WriteFile
SetStdHandle
TlsAlloc
GetCommandLineW
InterlockedDecrement
lstrcmpiW
GetModuleHandleW
VirtualAlloc
GetCommandLineA
GetStdHandle
gdi32
GetDeviceCaps
SelectClipRgn
CreateDCW
IntersectClipRect
SelectObject
DeleteDC
GetPixel
StretchDIBits
SetMapMode
DeleteObject
EnumFontFamiliesExW
GetObjectW
CreateFontIndirectW
shlwapi
StrFormatByteSizeW
StrStrW
PathStripToRootW
comdlg32
GetOpenFileNameA
ChooseFontA
Sections
.text Size: 64KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 472KB - Virtual size: 470KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ