Static task
static1
Behavioral task
behavioral1
Sample
f4558fb07bfdfa1aee2ff963180f3168b3499d5e2477b792b7433c8ae8b10ee6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f4558fb07bfdfa1aee2ff963180f3168b3499d5e2477b792b7433c8ae8b10ee6.exe
Resource
win10v2004-20220812-en
General
-
Target
f4558fb07bfdfa1aee2ff963180f3168b3499d5e2477b792b7433c8ae8b10ee6
-
Size
732KB
-
MD5
7f8ccbdbe369b8a9fb1f0fb188e0ecb0
-
SHA1
95735f27e9efad2160a1f7c8c8a8283009d557c6
-
SHA256
f4558fb07bfdfa1aee2ff963180f3168b3499d5e2477b792b7433c8ae8b10ee6
-
SHA512
8c1c4eb796d4a5e2e6f23217fbbfee8f02fcf383918998257e00aa212b358e2700a7166a569cf324ca72c289db5b2ef4898c729706ac8f72effde797f8d49492
-
SSDEEP
12288:jHc/iOP6FN3oMdPbDiQAzakr3PuHw0OOYZ33uTGcSKE+J6z2:jCiOPyhhpRImHpqOSefJ6q
Malware Config
Signatures
Files
-
f4558fb07bfdfa1aee2ff963180f3168b3499d5e2477b792b7433c8ae8b10ee6.exe windows x86
450e998cb753e0a7c4005cfd5f2d6ea7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsAlloc
GetDiskFreeSpaceW
HeapReAlloc
GetProcessShutdownParameters
FreeEnvironmentStringsA
GetUserDefaultLangID
GetEnvironmentStrings
EnumSystemLocalesA
ReadConsoleOutputA
InitializeCriticalSectionAndSpinCount
VirtualQuery
HeapSize
TlsSetValue
SetConsoleScreenBufferSize
GetLastError
GetCurrentProcessId
DeleteCriticalSection
EnumResourceTypesW
GetProcessHeap
WriteFile
GetLocaleInfoA
GetLocaleInfoW
LCMapStringA
GetConsoleMode
UnhandledExceptionFilter
SetEnvironmentVariableA
ExitProcess
LeaveCriticalSection
InterlockedIncrement
IsValidCodePage
WriteConsoleW
GetVersionExA
SetVolumeLabelA
GetCPInfo
CompareStringW
GetACP
GetUserDefaultLCID
GlobalAddAtomA
GetOEMCP
IsValidLocale
GetLogicalDriveStringsA
GetConsoleCP
EnterCriticalSection
GetTempFileNameA
SetLocalTime
GetModuleHandleA
FreeLibrary
EnumResourceLanguagesA
LocalShrink
MoveFileExW
GetTimeFormatW
WriteConsoleA
HeapCreate
GetSystemTimeAsFileTime
HeapDestroy
lstrcmpiA
GlobalFlags
GetCurrentThreadId
FreeEnvironmentStringsW
InterlockedExchange
GetStdHandle
LocalAlloc
HeapFree
SetStdHandle
GetDateFormatA
HeapAlloc
Sleep
SetLastError
VirtualAlloc
CompareStringA
GetStartupInfoW
CreateDirectoryExW
InterlockedDecrement
WritePrivateProfileSectionW
RtlUnwind
QueryPerformanceCounter
InitializeCriticalSection
GetStringTypeW
LoadLibraryA
GetModuleFileNameA
GetModuleFileNameW
EnumResourceNamesA
IsDebuggerPresent
SetConsoleCtrlHandler
WritePrivateProfileStringA
CreateMutexA
TerminateProcess
GlobalUnlock
CloseHandle
GetStringTypeA
WideCharToMultiByte
CreateDirectoryW
GetCurrentProcess
GetStartupInfoA
GetThreadSelectorEntry
GetCommandLineA
MultiByteToWideChar
TlsGetValue
GetProcAddress
GetConsoleOutputCP
SetFilePointer
VirtualFree
OpenMutexA
GetEnvironmentStringsW
TlsFree
SetHandleCount
ReadFile
SetUnhandledExceptionFilter
MoveFileA
GetCommandLineW
GetTickCount
lstrcpynA
GetCurrentThread
CreateFileA
GetFileType
FlushFileBuffers
TransactNamedPipe
GetTimeFormatA
GetTimeZoneInformation
LCMapStringW
comctl32
ImageList_ReplaceIcon
ImageList_SetDragCursorImage
InitCommonControlsEx
MakeDragList
ImageList_GetIcon
shell32
InternalExtractIconListA
RealShellExecuteW
SHFileOperation
user32
PostThreadMessageA
CloseWindowStation
DrawCaption
DestroyWindow
GetWindowRect
TrackPopupMenuEx
ScrollWindow
MessageBoxA
RegisterWindowMessageW
PtInRect
CreateWindowExA
RegisterClassExA
ShowWindow
DrawFrameControl
DdeSetQualityOfService
LoadImageW
GetWindowThreadProcessId
DefWindowProcA
EditWndProc
CharPrevExA
RegisterClassA
EnumChildWindows
Sections
.text Size: 100KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 436KB - Virtual size: 432KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 144KB - Virtual size: 153KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ