Static task
static1
Behavioral task
behavioral1
Sample
f4ea5076777ffedba25d0c72e46b65138c92c31dc5b1a8ea7b3c2b2b9884409c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f4ea5076777ffedba25d0c72e46b65138c92c31dc5b1a8ea7b3c2b2b9884409c.exe
Resource
win10v2004-20220901-en
General
-
Target
f4ea5076777ffedba25d0c72e46b65138c92c31dc5b1a8ea7b3c2b2b9884409c
-
Size
934KB
-
MD5
2b16d2aff60dfb12252baa7cbda0baa4
-
SHA1
095987fb6676fb1977020285feaad5b87e7634df
-
SHA256
f4ea5076777ffedba25d0c72e46b65138c92c31dc5b1a8ea7b3c2b2b9884409c
-
SHA512
21d51c06a329fcee108a8cd1274ecec2d02d43233b7cc6d8caef0940c5fc4fb12c9a5b3dda729ab0ee7e54947dc3ef7b2221af3e289779202598ea39cc6fbb25
-
SSDEEP
24576:ZEBYJWWLTK3mfQomzGmq36coE3zLzJz8xnFWG:ZEmIKTK3mfQowGmq33yGG
Malware Config
Signatures
Files
-
f4ea5076777ffedba25d0c72e46b65138c92c31dc5b1a8ea7b3c2b2b9884409c.exe windows x86
be4f3ac2e090e5b82c286830ea20fa11
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DispatchMessageA
EndPaint
GetDC
ReleaseDC
SetWindowLongA
TranslateMessage
GetWindow
EnableMenuItem
GetWindowLongA
SetFocus
BeginPaint
GetWindowRect
GetDlgItem
ClientToScreen
GetDesktopWindow
MessageBoxA
GetKeyState
CallWindowProcA
EnableWindow
SetCursor
kernel32
FindFirstFileA
InterlockedDecrement
FormatMessageA
SetLastError
GetFileAttributesA
WaitForSingleObject
HeapDestroy
DeleteCriticalSection
GetCurrentProcess
LocalAlloc
GetTempPathA
GetCPInfo
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
FreeLibrary
FormatMessageW
GetEnvironmentVariableA
LoadResource
GetCurrentProcessId
GetCommandLineA
GetLastError
GetCurrentThread
GetTickCount
GetCurrentThreadId
GetModuleHandleA
ExitProcess
VirtualAlloc
Sleep
UnmapViewOfFile
GetEnvironmentStrings
GetACP
CloseHandle
ReadFile
MapViewOfFile
HeapSize
SizeofResource
RemoveDirectoryA
GlobalUnlock
GetSystemInfo
HeapCreate
LeaveCriticalSection
CreateFileA
GetFileType
GetTimeZoneInformation
IsDebuggerPresent
lstrcmpA
GetProcessHeap
GetProcAddress
GetStartupInfoW
LoadLibraryA
FlushFileBuffers
QueryPerformanceCounter
SetEvent
EnterCriticalSection
HeapFree
InterlockedIncrement
SetEndOfFile
VirtualQuery
WriteConsoleA
MulDiv
SetUnhandledExceptionFilter
MultiByteToWideChar
LoadLibraryExW
UnhandledExceptionFilter
SetConsoleCtrlHandler
GetModuleFileNameA
HeapAlloc
FindClose
oleaut32
SysStringLen
SysAllocString
VariantClear
Sections
.text Size: 905KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ