Static task
static1
Behavioral task
behavioral1
Sample
9f6c0484da52b33ab98641b69f2c11bef81c33ddcffbfadf8775f684ac8751f7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9f6c0484da52b33ab98641b69f2c11bef81c33ddcffbfadf8775f684ac8751f7.exe
Resource
win10v2004-20220812-en
General
-
Target
9f6c0484da52b33ab98641b69f2c11bef81c33ddcffbfadf8775f684ac8751f7
-
Size
684KB
-
MD5
05e857de42459c60d6fe0fc45027a9ce
-
SHA1
890601f4b2ba285ca98ab7e059d2f04eeec87492
-
SHA256
9f6c0484da52b33ab98641b69f2c11bef81c33ddcffbfadf8775f684ac8751f7
-
SHA512
7baa950860d923cbea7a1568f54b78279aa5daad0af07035196b4767d62672c24daf9a881fe4e3d6db9642289d6370e662550a00a8a8ba362b84809b5e87dedf
-
SSDEEP
12288:ddjMW21t1CoJKKVZGnYh9annHrB3VTifVoXM5c0zd0em7:dl9mt15KKVZ9hUHrvTi9oX89c
Malware Config
Signatures
Files
-
9f6c0484da52b33ab98641b69f2c11bef81c33ddcffbfadf8775f684ac8751f7.exe windows x86
7dae052ff454c256772b277e5dcd5607
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetProcessWindowStation
wsprintfA
ImpersonateDdeClientWindow
SetUserObjectSecurity
FrameRect
GetKeyboardLayoutList
DrawEdge
DefWindowProcW
GetProcessWindowStation
RegisterClassExA
CharUpperBuffW
GetWindowModuleFileNameA
EnumDisplaySettingsW
RegisterClassA
MessageBoxW
ShowWindow
GetClassNameA
LoadIconA
CharUpperBuffA
LoadCursorA
SetMessageExtraInfo
PostQuitMessage
DrawTextExA
SetWinEventHook
DialogBoxIndirectParamW
GetCaretBlinkTime
SendDlgItemMessageA
UnregisterDeviceNotification
CreateWindowExA
DestroyWindow
GetKeyState
MapDialogRect
DeferWindowPos
EnumPropsW
PtInRect
DlgDirListW
GetMessageW
LoadBitmapA
GetWindowLongW
PostMessageA
TranslateMessage
DdeSetQualityOfService
OemKeyScan
OpenClipboard
InvalidateRgn
DialogBoxParamA
MessageBeep
EqualRect
GetClassNameW
GetScrollPos
CheckRadioButton
comctl32
ImageList_Write
ImageList_SetFlags
_TrackMouseEvent
ImageList_LoadImageW
ImageList_BeginDrag
ImageList_Add
ImageList_GetBkColor
DestroyPropertySheetPage
ImageList_Duplicate
CreateStatusWindowA
ImageList_Remove
ImageList_LoadImage
InitCommonControlsEx
ImageList_SetImageCount
ImageList_SetDragCursorImage
ImageList_GetIconSize
ImageList_DragLeave
DrawStatusTextA
ImageList_GetIcon
ImageList_Copy
ImageList_Merge
kernel32
GetCPInfo
GetConsoleOutputCP
GetEnvironmentStrings
EnumSystemLocalesA
UnhandledExceptionFilter
GetSystemTimeAsFileTime
TlsGetValue
CompareStringA
FreeEnvironmentStringsW
GetModuleHandleW
GetCurrentThreadId
GetEnvironmentStringsW
GetLocaleInfoA
GetStdHandle
TlsSetValue
VirtualQuery
SetEnvironmentVariableA
WriteFile
InterlockedExchange
FreeEnvironmentStringsA
SetUnhandledExceptionFilter
ExitProcess
GetStringTypeW
GetConsoleCP
TerminateProcess
IsValidCodePage
HeapSize
GetFileType
HeapAlloc
GetTimeFormatA
GetStartupInfoA
SetFilePointer
VirtualFree
CloseHandle
GetUserDefaultLCID
FreeLibrary
GetCommandLineA
LoadLibraryW
OpenFileMappingW
OpenMutexA
HeapReAlloc
FindFirstFileW
RtlUnwind
GetDateFormatA
WriteConsoleA
TlsFree
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
GetCurrentProcessId
EnterCriticalSection
DuplicateHandle
GetLastError
GetModuleFileNameA
SetConsoleCtrlHandler
SetLastError
ReadFile
GetCurrentProcess
GetCurrentThread
CreateFileA
HeapCreate
GetLocaleInfoW
DeleteCriticalSection
FlushFileBuffers
SetStdHandle
IsDebuggerPresent
LeaveCriticalSection
GetConsoleMode
GetCalendarInfoA
HeapFree
GetModuleHandleA
IsValidLocale
VirtualAlloc
Sleep
SetHandleCount
FindFirstFileA
LoadLibraryA
LCMapStringW
TlsAlloc
GetTimeZoneInformation
GetTickCount
CompareStringW
InterlockedDecrement
GetOEMCP
HeapDestroy
GetProcAddress
WriteConsoleW
InterlockedIncrement
GetStringTypeA
WideCharToMultiByte
QueryPerformanceCounter
GetACP
LCMapStringA
CreateMutexA
Sections
.text Size: 244KB - Virtual size: 241KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 248KB - Virtual size: 247KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 120KB - Virtual size: 142KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ