Static task
static1
Behavioral task
behavioral1
Sample
5f4da8f874f95fdfd5ebdcd5b2301f9933d4334c78a2a5a9879d0cc253c55d10.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5f4da8f874f95fdfd5ebdcd5b2301f9933d4334c78a2a5a9879d0cc253c55d10.exe
Resource
win10v2004-20220901-en
General
-
Target
5f4da8f874f95fdfd5ebdcd5b2301f9933d4334c78a2a5a9879d0cc253c55d10
-
Size
608KB
-
MD5
fb84a54fb0075784d2412a43ab2b25e9
-
SHA1
c0d237588911c969c260bdb178d5a2e6b3f419f1
-
SHA256
5f4da8f874f95fdfd5ebdcd5b2301f9933d4334c78a2a5a9879d0cc253c55d10
-
SHA512
e368484d68ad72e5312c1c7dc1547305157b14560eeda23bf1af9949920ca8060339be7ba4ebe479e5cd6c1889867e1a9bc6eb6ffbc3840ef714c659500aa604
-
SSDEEP
12288:sCENU8xficA3BH7i76VXNjjNQOsYLZRCqTPQp2IaT4j1TA:sCf8xfi9R7g6Jxsy7IBB
Malware Config
Signatures
Files
-
5f4da8f874f95fdfd5ebdcd5b2301f9933d4334c78a2a5a9879d0cc253c55d10.exe windows x86
3ab3dc682d9597709d376eeffd9d93b3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHFileOperationA
user32
GetDlgItemInt
DestroyIcon
CreateWindowExA
TranslateAcceleratorA
RegisterClassA
PeekMessageW
CallMsgFilterW
LoadCursorA
DestroyCursor
LoadMenuW
GetClipCursor
LoadStringA
GetKBCodePage
DrawTextExA
SetMenuItemBitmaps
ShowWindow
DragObject
DefFrameProcA
SetWindowsHookA
CloseClipboard
SendInput
CreateMDIWindowA
MapVirtualKeyW
GetInputDesktop
EndDeferWindowPos
LoadImageA
SetForegroundWindow
SetLastErrorEx
SetUserObjectSecurity
GetCaretPos
SetMenuInfo
GetKeyboardLayoutNameA
UnregisterClassA
ToAsciiEx
DdeQueryNextServer
UpdateWindow
GetScrollRange
DestroyWindow
SetThreadDesktop
GetKeyState
RegisterClassExA
RegisterDeviceNotificationW
GetKeyboardLayoutNameW
TrackMouseEvent
AttachThreadInput
LoadBitmapW
BlockInput
CallNextHookEx
CascadeChildWindows
DefWindowProcA
DefFrameProcW
DlgDirListA
RedrawWindow
WINNLSGetEnableStatus
OpenIcon
ChangeDisplaySettingsW
TranslateAccelerator
AnimateWindow
SendNotifyMessageW
CheckMenuItem
MessageBoxA
SetProcessWindowStation
GetMessagePos
comctl32
ImageList_LoadImage
InitCommonControlsEx
ImageList_AddIcon
ImageList_Remove
ImageList_SetOverlayImage
_TrackMouseEvent
ImageList_GetImageRect
CreateToolbarEx
ImageList_DragEnter
ImageList_LoadImageA
ImageList_AddMasked
DrawStatusTextW
DrawStatusText
ImageList_DrawIndirect
ImageList_SetFlags
ImageList_Add
CreateMappedBitmap
ImageList_EndDrag
ImageList_Duplicate
ImageList_GetIcon
ImageList_SetFilter
InitMUILanguage
ImageList_Read
comdlg32
PageSetupDlgA
LoadAlterBitmap
GetOpenFileNameW
gdi32
DeleteObject
GetCharWidth32W
LineTo
GetCharABCWidthsW
GetObjectA
CreateDCW
GetStockObject
DPtoLP
PlayMetaFileRecord
GetRegionData
GetPixelFormat
SetViewportExtEx
GetEnhMetaFileA
GetRasterizerCaps
SetBkMode
GetDeviceCaps
ModifyWorldTransform
DeleteDC
kernel32
HeapValidate
lstrcpy
GetTimeZoneInformation
DeleteCriticalSection
GetLastError
GetProfileSectionW
WriteFile
GlobalFindAtomW
CompareStringA
LockFile
SetLastError
GetDriveTypeA
GetEnvironmentStrings
GetComputerNameA
InterlockedExchange
GetProcessHeaps
GetSystemTimeAsFileTime
GetCurrentProcess
ReadConsoleInputA
GetTimeFormatA
TerminateProcess
CreatePipe
SetVolumeLabelW
CreateDirectoryExW
GetModuleHandleA
IsBadReadPtr
GetModuleFileNameA
TlsGetValue
RtlUnwind
FindFirstFileW
GetCalendarInfoA
SetConsoleTitleA
EnumResourceLanguagesW
OpenWaitableTimerA
FlushFileBuffers
GetStringTypeW
OpenEventA
WaitCommEvent
CompareStringW
GetLogicalDrives
GlobalGetAtomNameA
GetUserDefaultLCID
HeapLock
SetLocaleInfoW
GetThreadTimes
SetConsoleTextAttribute
VirtualQuery
GetTempPathA
SetUnhandledExceptionFilter
AllocConsole
HeapSize
FreeEnvironmentStringsW
CreateRemoteThread
GetNamedPipeHandleStateW
IsValidCodePage
GetCurrentThread
UnhandledExceptionFilter
GetVersionExA
GetCurrencyFormatA
GetCPInfo
EnterCriticalSection
MultiByteToWideChar
lstrcpyn
GetCommandLineA
VirtualFree
LocalLock
VirtualAlloc
OpenMutexA
GetCurrentProcessId
EnumTimeFormatsA
WideCharToMultiByte
DeleteFileA
GetOEMCP
SetFilePointer
SetConsoleActiveScreenBuffer
GetCurrentThreadId
GetFileType
HeapDestroy
WritePrivateProfileStructW
GetSystemDefaultLangID
FreeEnvironmentStringsA
GetEnvironmentStringsA
GetDiskFreeSpaceExW
InitializeCriticalSection
WritePrivateProfileSectionW
HeapFree
GetConsoleScreenBufferInfo
GetProcAddress
CloseHandle
OpenEventW
EnumSystemLocalesA
EnumResourceLanguagesA
GetNamedPipeHandleStateA
CreateMutexA
GetThreadPriorityBoost
CreateNamedPipeW
LeaveCriticalSection
OpenMutexW
GetLocaleInfoW
HeapReAlloc
TlsAlloc
LoadLibraryA
GetEnvironmentStringsW
GetDateFormatA
SetStdHandle
GetSystemInfo
GetLocaleInfoA
LCMapStringA
SetThreadPriority
SetLocaleInfoA
FindFirstFileExW
GetVolumeInformationA
FindResourceExA
GetDiskFreeSpaceA
GetStdHandle
LCMapStringW
ExitProcess
GetStartupInfoA
GetTickCount
SetEvent
FindResourceW
IsBadWritePtr
QueryPerformanceCounter
IsValidLocale
VirtualProtect
OpenFileMappingW
CreateSemaphoreW
CommConfigDialogW
GlobalSize
HeapAlloc
TlsSetValue
TlsFree
ReadFile
CreateMutexW
SetHandleCount
GetStringTypeA
HeapCreate
FreeResource
SetEnvironmentVariableA
GetACP
FindNextFileW
WriteProfileStringW
OpenSemaphoreA
wininet
InternetSetDialState
InternetSetCookieW
Sections
.text Size: 200KB - Virtual size: 198KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 260KB - Virtual size: 257KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ