Static task
static1
Behavioral task
behavioral1
Sample
4d387b8a2c613344687116dfc3ebac23cb08f54e9ccf3ef26d5be0ea3a1adb20.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4d387b8a2c613344687116dfc3ebac23cb08f54e9ccf3ef26d5be0ea3a1adb20.exe
Resource
win10v2004-20220812-en
General
-
Target
4d387b8a2c613344687116dfc3ebac23cb08f54e9ccf3ef26d5be0ea3a1adb20
-
Size
581KB
-
MD5
8aef01fee7d93abc6d71e1253efaed6e
-
SHA1
f32418babf3edc06c327ea58ac8572bf9d843e98
-
SHA256
4d387b8a2c613344687116dfc3ebac23cb08f54e9ccf3ef26d5be0ea3a1adb20
-
SHA512
73d1452fd1c22835dd7f84f32142cb2999c47b733a689d78220e27fb65254ac965e861f9700d0b853099e2ad9b3781e00934d66d83175687bf4aa23a9f172b05
-
SSDEEP
12288:ANTggRLueh9EMYFhhVJ9iejn3gbiiTM+PaqssyDOSCB6F:AN8gRL7yBnnmnaqssyS1
Malware Config
Signatures
Files
-
4d387b8a2c613344687116dfc3ebac23cb08f54e9ccf3ef26d5be0ea3a1adb20.exe windows x86
05d747f799c7e4fb153ef932659f62a5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
OpenMutexA
RtlUnwind
ContinueDebugEvent
LeaveCriticalSection
TlsAlloc
GetStringTypeW
SetUnhandledExceptionFilter
FormatMessageW
WriteConsoleA
GetCurrentThreadId
HeapReAlloc
OpenFileMappingW
LoadResource
TlsSetValue
SetThreadLocale
VirtualQuery
EnumSystemLocalesA
VirtualUnlock
WriteFileEx
QueryPerformanceCounter
GlobalCompact
OpenMutexW
RtlFillMemory
ReadConsoleW
GetProcessHeap
ExitProcess
VirtualAlloc
GetLocaleInfoA
DeleteFileW
SetComputerNameW
HeapAlloc
GetFileType
GetCommandLineA
EnumCalendarInfoExW
GetCurrentProcess
HeapCreate
GetSystemTimeAsFileTime
UnhandledExceptionFilter
GetTimeFormatA
ResumeThread
InterlockedDecrement
ReadFile
LCMapStringW
GetLastError
lstrcpyA
EnumSystemCodePagesA
LoadLibraryA
HeapDestroy
GetModuleFileNameA
CreateFileW
CompareStringA
InterlockedExchange
WaitCommEvent
SetStdHandle
FreeEnvironmentStringsA
GetSystemDefaultLangID
GetConsoleMode
FillConsoleOutputCharacterW
GetThreadPriorityBoost
SetConsoleCtrlHandler
SetEnvironmentVariableA
InitializeCriticalSection
GetProcessHeaps
HeapValidate
GetUserDefaultLCID
WriteConsoleOutputCharacterA
GetVersionExA
IsValidCodePage
VirtualFree
UnlockFileEx
HeapSize
TerminateProcess
TlsFree
GetDateFormatA
GetStdHandle
CloseHandle
CommConfigDialogW
GetTimeZoneInformation
GetShortPathNameA
SetHandleCount
EnterCriticalSection
SetComputerNameA
SetVolumeLabelW
DeleteCriticalSection
GetProcAddress
SetLastError
TlsGetValue
LocalFileTimeToFileTime
FreeEnvironmentStringsW
GlobalGetAtomNameA
GetModuleHandleA
WriteConsoleW
GlobalDeleteAtom
ReadConsoleOutputW
Sleep
GetTickCount
SetFilePointer
GetCurrentThread
LCMapStringA
ReadConsoleOutputCharacterA
GetEnvironmentStringsW
WriteFile
GetProfileIntW
FreeLibrary
GetConsoleCP
GetStringTypeA
CompareStringW
GetEnvironmentStrings
GetEnvironmentVariableW
GetConsoleOutputCP
FlushFileBuffers
DebugActiveProcess
GetLocaleInfoW
GetStartupInfoA
GetACP
FlushConsoleInputBuffer
EnumResourceLanguagesW
GetCurrentProcessId
MultiByteToWideChar
CreateMutexA
WritePrivateProfileStringA
IsDebuggerPresent
WideCharToMultiByte
EnumDateFormatsW
InterlockedIncrement
GetTempPathW
HeapLock
GetOEMCP
FindFirstFileExA
IsValidLocale
GetStartupInfoW
GetCPInfo
CreateFileA
comdlg32
ReplaceTextW
GetOpenFileNameW
PrintDlgW
comctl32
ImageList_DragMove
CreateUpDownControl
ImageList_Write
ImageList_DragShowNolock
CreateMappedBitmap
ImageList_LoadImageA
ImageList_EndDrag
_TrackMouseEvent
ImageList_LoadImageW
ImageList_DrawIndirect
CreatePropertySheetPage
ImageList_SetOverlayImage
ImageList_GetFlags
ImageList_DrawEx
CreateStatusWindowA
ImageList_Replace
ImageList_GetDragImage
ImageList_Add
InitCommonControlsEx
ImageList_ReplaceIcon
ImageList_LoadImage
DrawStatusTextW
ImageList_Duplicate
ImageList_Read
gdi32
AbortDoc
FlattenPath
CloseMetaFile
GetCharWidth32W
PolyDraw
GetDeviceCaps
GetDIBColorTable
GetObjectW
ExtCreateRegion
PlgBlt
LineTo
PathToRegion
DeleteDC
CreateDIBitmap
SetGraphicsMode
SetICMMode
CreateDCA
SetStretchBltMode
GetMiterLimit
UpdateICMRegKeyA
GetCharWidthW
CombineTransform
user32
GetPropW
MessageBoxExW
RegisterClassExW
CreateMDIWindowW
GetMenu
CharPrevExA
VkKeyScanA
SetFocus
SendMessageA
GetMessageTime
RegisterClassA
GetKeyboardState
PeekMessageA
IsDialogMessage
GetUserObjectInformationA
SendInput
UnhookWindowsHookEx
ActivateKeyboardLayout
DdePostAdvise
LoadMenuIndirectA
DdeReconnect
OpenClipboard
DdeInitializeW
CreateAcceleratorTableA
PostThreadMessageA
DdeUninitialize
RegisterClassExA
MapVirtualKeyW
GetComboBoxInfo
GetGUIThreadInfo
OemToCharA
FindWindowExW
GetMessagePos
GetMessageExtraInfo
GetWindowLongW
advapi32
RegEnumKeyW
Sections
.text Size: 186KB - Virtual size: 185KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 253KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ