Static task
static1
Behavioral task
behavioral1
Sample
a1f49053943b39eea45532c8f8de4502368073b5d251b1f2a5d15d99540e49db.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a1f49053943b39eea45532c8f8de4502368073b5d251b1f2a5d15d99540e49db.exe
Resource
win10v2004-20220901-en
General
-
Target
a1f49053943b39eea45532c8f8de4502368073b5d251b1f2a5d15d99540e49db
-
Size
278KB
-
MD5
7ed0a0454604c79c7deaaf1985a85eed
-
SHA1
4e2f2b937c5c2da806978b74e9d07c6e8ddcb3d7
-
SHA256
a1f49053943b39eea45532c8f8de4502368073b5d251b1f2a5d15d99540e49db
-
SHA512
884a9ec94edd408b50d133fadfc5c9020613166863434f5ad2e5901916460d5c6f3328b7b395cd75052a3d6e41e3a20200c45d95cd723f18bb254451d797d20a
-
SSDEEP
6144:m54slxO1LH7Rr+9c/wc6GMtbaxn1vlYPGrLKZksYZw9:i4YaL1ra4YBKVWSsT9
Malware Config
Signatures
Files
-
a1f49053943b39eea45532c8f8de4502368073b5d251b1f2a5d15d99540e49db.exe windows x86
49646fd4f87056af37bdf25cee5f2adc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetDesktopWindow
CharLowerA
DestroyWindow
MessageBoxA
DialogBoxIndirectParamA
TranslateMessage
PeekMessageA
GetWindowLongA
EndDialog
GetDlgItem
SendMessageA
SetWindowLongA
DispatchMessageA
IsDialogMessageA
CreateDialogIndirectParamA
SetDlgItemTextA
BringWindowToTop
GetClientRect
GetWindowRect
MoveWindow
CharNextA
CharUpperA
wsprintfA
ReleaseDC
LoadImageA
GetDC
EndPaint
CreateDialogParamA
BeginPaint
advapi32
RegCloseKey
RegOpenKeyA
RegCreateKeyA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
VerInstallFileA
kernel32
HeapSize
SetFilePointer
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
HeapReAlloc
InitializeCriticalSectionAndSpinCount
LoadLibraryA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CopyFileA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetCurrentProcessId
VirtualAlloc
ReadConsoleOutputCharacterA
ReadConsoleInputA
OpenFileMappingA
TerminateThread
CreateFileMappingW
GetOverlappedResult
GetVersionExA
CallNamedPipeW
CompareStringW
SetErrorMode
CreateFileA
CreateProcessA
GetPrivateProfileIntA
MultiByteToWideChar
GlobalFree
GlobalUnlock
WideCharToMultiByte
lstrlenW
CloseHandle
Sleep
DeleteFileA
GetAtomNameA
RtlUnwind
GetModuleFileNameA
GetUserDefaultLangID
GlobalAlloc
GlobalLock
GetPrivateProfileStringA
CompareStringA
lstrlenA
SetLastError
CreateDirectoryA
GetFileAttributesA
GetWindowsDirectoryA
GetShortPathNameA
GetLastError
SetFileAttributesA
WaitForSingleObject
GetTempPathA
GetTempFileNameA
OpenEventA
SetEvent
FormatMessageA
LocalFree
RemoveDirectoryA
FindResourceExA
FindResourceA
LoadResource
LockResource
HeapFree
HeapAlloc
GetCommandLineA
GetSystemTimeAsFileTime
GetStartupInfoA
RaiseException
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
Sections
.text Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 118KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ