Static task
static1
Behavioral task
behavioral1
Sample
5ffc79517a4f44e247b771943476800a4edbcb97e257a92fa1bf09bf8e5d4a69.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5ffc79517a4f44e247b771943476800a4edbcb97e257a92fa1bf09bf8e5d4a69.exe
Resource
win10v2004-20220901-en
General
-
Target
5ffc79517a4f44e247b771943476800a4edbcb97e257a92fa1bf09bf8e5d4a69
-
Size
175KB
-
MD5
5aecb55dd4c19eab85fbe02c794f8cd0
-
SHA1
ee93e481c75adade503d456ae08a6ed93594e9d8
-
SHA256
5ffc79517a4f44e247b771943476800a4edbcb97e257a92fa1bf09bf8e5d4a69
-
SHA512
9aad65e3491110654831d17e31ca94aabf8abf4d1c54d8618c0f3c75e3b8f7a49d332ed7417b60dd043767c4dd3e534d4661c5d133afb6517d9964015127a374
-
SSDEEP
3072:1FFlHrh2OxGNDnGOb+ahXNqJohePnq45L84IKHrtO+K2u:jobNDGOb+asEwv5LnHRO+K2
Malware Config
Signatures
Files
-
5ffc79517a4f44e247b771943476800a4edbcb97e257a92fa1bf09bf8e5d4a69.exe windows x86
1f66097bb7f337bf9a2636abaaab5e0e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CopyFileA
SetFileAttributesA
FindClose
GetPrivateProfileStringA
LocalAlloc
WritePrivateProfileStringA
GetSystemInfo
GetModuleFileNameA
GetPrivateProfileSectionA
CompareStringA
GetUserDefaultUILanguage
CloseHandle
GetVersion
LocalFree
DeleteFileA
FreeResource
MapViewOfFile
UnmapViewOfFile
_llseek
FreeLibrary
LoadResource
_lwrite
GlobalLock
_lclose
GetTickCount
EnumResourceTypesA
FindResourceExA
GlobalAlloc
SizeofResource
GetProcAddress
GlobalUnlock
SetLastError
GlobalFree
GetTempFileNameA
CreateFileMappingA
MoveFileA
LockResource
_lread
LoadLibraryExA
EnumResourceNamesA
GetFileInformationByHandle
GetTempPathA
GetCurrentDirectoryA
GetSystemTime
WideCharToMultiByte
MultiByteToWideChar
lstrcmpiA
GetLastError
FindFirstFileA
CreateDirectoryA
GetShortPathNameA
ReadFile
CreateProcessA
GetExitCodeProcess
GetFileAttributesA
GetPrivateProfileIntA
WriteFile
FormatMessageA
GetModuleHandleW
WritePrivateProfileSectionA
lstrcmpA
Sleep
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetModuleHandleA
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetVersionExA
IsDBCSLeadByte
CreateFileA
EnumResourceLanguagesA
GetFullPathNameA
gdi32
GetStockObject
GetDeviceCaps
CreateFontIndirectA
DeleteObject
GetObjectA
CreateFontIndirectW
user32
ShowWindow
CheckDlgButton
GetWindowRect
SystemParametersInfoW
CharPrevA
CheckRadioButton
GetDlgItemTextA
SetDlgItemTextA
SendDlgItemMessageA
MsgWaitForMultipleObjects
LoadStringA
GetParent
MessageBeep
CharNextA
SetFocus
SendMessageA
GetDC
SetWindowLongA
MessageBoxA
GetWindowLongA
PeekMessageA
ReleaseDC
GetDlgItem
PostMessageA
DispatchMessageA
GetSystemMetrics
EnableWindow
CallWindowProcA
IsDlgButtonChecked
msvcrt
_controlfp
?terminate@@YAXXZ
_acmdln
__setusermatherr
_ismbblead
__p__fmode
_initterm
_except_handler4_common
_cexit
_exit
exit
__set_app_type
__getmainargs
_amsg_exit
__p__commode
_XcptFilter
wcsncmp
mbstowcs
_splitpath_s
strtoul
toupper
memcpy_s
_vsnprintf
strtok
strchr
malloc
free
_itoa_s
_itoa
memcpy
memset
comctl32
CreatePropertySheetPageA
PropertySheetA
DestroyPropertySheetPage
comdlg32
GetOpenFileNameA
GetSaveFileNameA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
imagehlp
CheckSumMappedFile
advapi32
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
Sections
.text Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rvmkwmx Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE