Static task
static1
Behavioral task
behavioral1
Sample
5076c6f7ab9d98b8b2c2e27ecc8b53cdb9aa596146498b889bb7b04a586b6f89.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5076c6f7ab9d98b8b2c2e27ecc8b53cdb9aa596146498b889bb7b04a586b6f89.exe
Resource
win10v2004-20220812-en
General
-
Target
5076c6f7ab9d98b8b2c2e27ecc8b53cdb9aa596146498b889bb7b04a586b6f89
-
Size
320KB
-
MD5
66f9dece1155a52447a7a1278f9ae06e
-
SHA1
9b77cbb14514ec8a0a49d8083c2f5d3655d2973f
-
SHA256
5076c6f7ab9d98b8b2c2e27ecc8b53cdb9aa596146498b889bb7b04a586b6f89
-
SHA512
36f8e9f954b0076a36138dfbc5835a87ced8183fa8e0435f72594c39b383f93f2ec413c7f63e6145500cd4ae3d7611fe225356523af16783b0c8eb973d42b4f8
-
SSDEEP
6144:vwxng52bZc+XQ76pYunClVHgt/OAro0JHt10RfmQA7MTSEXc/dFPi7zBU:4xgIc+Xk6tCDgVOoJHt1uAYWEM/dZA
Malware Config
Signatures
Files
-
5076c6f7ab9d98b8b2c2e27ecc8b53cdb9aa596146498b889bb7b04a586b6f89.exe windows x86
6da3f83652416ed5847094b97681e22a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
AppendMenuW
MessageBoxW
GetCursorInfo
WINNLSGetIMEHotkey
DdeInitializeA
SetClipboardData
RegisterClipboardFormatA
ChangeDisplaySettingsA
SetPropA
RegisterClassExA
DdeSetQualityOfService
SetMenuItemInfoW
FreeDDElParam
CharToOemBuffA
VkKeyScanA
SetWindowTextW
DefWindowProcA
EnableMenuItem
CharLowerBuffA
RedrawWindow
RegisterClassA
EnumPropsExW
CreateWindowExW
SwitchToThisWindow
CascadeWindows
DdeClientTransaction
ShowWindow
DestroyWindow
comctl32
CreateStatusWindowW
CreateStatusWindowA
ImageList_SetIconSize
CreatePropertySheetPageA
InitCommonControlsEx
ImageList_LoadImageA
ImageList_AddIcon
ImageList_ReplaceIcon
ImageList_GetDragImage
ImageList_GetImageCount
ImageList_Merge
ImageList_SetOverlayImage
ImageList_SetFlags
ImageList_Draw
ImageList_Destroy
ImageList_BeginDrag
ImageList_LoadImageW
ImageList_Add
ImageList_Remove
CreatePropertySheetPageW
comdlg32
GetSaveFileNameA
PageSetupDlgW
PrintDlgW
kernel32
HeapAlloc
CreateMutexA
CreateToolhelp32Snapshot
InterlockedIncrement
GetStringTypeA
GetStringTypeW
VirtualQuery
GetSystemTimeAsFileTime
ReadFile
GetSystemTime
IsBadWritePtr
GetVersion
LCMapStringW
GetEnvironmentStringsW
GetOEMCP
GetModuleHandleA
LeaveCriticalSection
TlsGetValue
VirtualAlloc
LoadLibraryA
SetLastError
GetCurrentProcess
FlushFileBuffers
VirtualAllocEx
TlsAlloc
FreeEnvironmentStringsA
GetStdHandle
GetModuleFileNameA
SetStdHandle
GetCurrentThreadId
GetLastError
SetFilePointer
GetProcAddress
GetCPInfo
LCMapStringA
TerminateProcess
DeleteCriticalSection
GetACP
InterlockedCompareExchange
GetStartupInfoA
ExitProcess
CompareStringA
HeapReAlloc
OpenMutexA
GetFileType
InitializeCriticalSection
GetEnvironmentStrings
HeapDestroy
GetCurrentProcessId
EnterCriticalSection
InterlockedExchange
GetCurrentThread
UnhandledExceptionFilter
InterlockedDecrement
GetNamedPipeInfo
RtlUnwind
QueryPerformanceCounter
WriteFile
MultiByteToWideChar
GetCommandLineA
GetLogicalDrives
HeapFree
GetTimeZoneInformation
TlsSetValue
TlsFree
GetLocalTime
SetLocalTime
lstrlen
CompareStringW
FreeEnvironmentStringsW
SetHandleCount
HeapCreate
GetTickCount
WideCharToMultiByte
SetEnvironmentVariableA
CloseHandle
VirtualFree
Sections
.text Size: 112KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ