Static task
static1
Behavioral task
behavioral1
Sample
a5808c8e57c2c387443d327652d0607a055444d9b2e2f6f8cc986b18d4fc0371.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a5808c8e57c2c387443d327652d0607a055444d9b2e2f6f8cc986b18d4fc0371.exe
Resource
win10v2004-20220812-en
General
-
Target
a5808c8e57c2c387443d327652d0607a055444d9b2e2f6f8cc986b18d4fc0371
-
Size
320KB
-
MD5
a34b60b56587cad2cb7bfce9c79e9c46
-
SHA1
b86915b0e7ebbf163227a6bec43dcfb7b8b90612
-
SHA256
a5808c8e57c2c387443d327652d0607a055444d9b2e2f6f8cc986b18d4fc0371
-
SHA512
509a62b214a0abe8242dd1ee9efff1b6684af65b771a5100c260bd92209f771e930c2aedaad4909935ec8c6033c14e81108e177c4d5327726e77b153666d6ff9
-
SSDEEP
6144:k8fiN3tuac1o4pYbxRxHNaffUCussbFnGR1/F9HJUQkzn:hfg3tua54ibxThCNs5GR1bHJUQa
Malware Config
Signatures
Files
-
a5808c8e57c2c387443d327652d0607a055444d9b2e2f6f8cc986b18d4fc0371.exe windows x86
523cd61af62ec2617f235728acaeab5c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
LoadLibraryA
CompareStringW
GlobalFindAtomW
GlobalAddAtomW
GlobalFlags
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
HeapFree
HeapAlloc
GetProcessHeap
HeapReAlloc
ExitProcess
SetStdHandle
GetFileType
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapDestroy
VirtualFree
VirtualAlloc
GetStdHandle
GetModuleFileNameA
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetStartupInfoA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetCurrentDirectoryA
GetDriveTypeA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
GetModuleHandleA
GetFileTime
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
ReleaseMutex
CreateMutexW
GlobalDeleteAtom
GetCurrentThread
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
GetLocaleInfoW
CompareStringA
InterlockedExchange
lstrcmpW
SetErrorMode
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
GetFullPathNameW
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
SetLastError
GetThreadLocale
GetTempPathW
CreateFileW
DefineDosDeviceW
InterlockedDecrement
GetSystemDirectoryW
GetCurrentProcess
DeviceIoControl
GetVolumeInformationW
OutputDebugStringA
GetTickCount
GetModuleFileNameW
FindFirstFileW
FindNextFileW
FindClose
GetLogicalDriveStringsW
WideCharToMultiByte
lstrlenW
lstrlenA
WritePrivateProfileStringW
GetPrivateProfileStringW
CreateDirectoryW
CopyFileW
DeleteFileW
RemoveDirectoryW
LoadLibraryW
GetProcAddress
FreeLibrary
FormatMessageW
LocalFree
CreateThread
GetWindowsDirectoryW
GetCommandLineW
GetModuleHandleW
WaitForSingleObject
TerminateThread
GetLastError
CloseHandle
LoadResource
LockResource
SizeofResource
FindResourceW
MultiByteToWideChar
GetFileAttributesW
SetFileAttributesW
Sleep
GetCurrentThreadId
HeapCreate
OutputDebugStringW
user32
ShowWindow
SetWindowTextW
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
GetActiveWindow
GetCursorPos
ValidateRect
RegisterWindowMessageW
LoadIconW
WinHelpW
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetFocus
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
GetKeyState
SetForegroundWindow
PostThreadMessageW
DispatchMessageW
UnregisterClassA
TranslateMessage
GetMessageW
PeekMessageW
IsWindowVisible
GetClientRect
GetMenu
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
SetWindowLongW
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
GetWindowTextW
LoadCursorW
DestroyMenu
DestroyWindow
GetSystemMetrics
CharUpperW
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
PostQuitMessage
PostMessageW
TabbedTextOutW
DrawTextW
DrawTextExW
GrayStringW
ClientToScreen
GetDC
GetSysColorBrush
GetWindowThreadProcessId
SendMessageW
GetParent
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxW
UnhookWindowsHookEx
GetSysColor
ReleaseDC
gdi32
ExtTextOutW
GetStockObject
CreateBitmap
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
SetTextColor
TextOutW
RectVisible
PtVisible
DeleteObject
GetClipBox
SetMapMode
GetDeviceCaps
SaveDC
RestoreDC
SetBkColor
Escape
comdlg32
GetFileTitleW
winspool.drv
ClosePrinter
DocumentPropertiesW
OpenPrinterW
advapi32
RegEnumKeyW
RegOpenKeyW
RegEnumKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegOpenKeyExW
RegDeleteKeyW
RegCreateKeyExW
RegFlushKey
SetServiceStatus
RegisterServiceCtrlHandlerW
StartServiceCtrlDispatcherW
RegisterEventSourceW
ReportEventW
StartServiceW
QueryServiceStatusEx
ControlService
DeleteService
CreateServiceW
RegCreateKeyW
RegSetValueExW
RegCloseKey
ChangeServiceConfig2W
OpenSCManagerW
OpenServiceW
CloseServiceHandle
DeregisterEventSource
RegQueryValueW
shell32
SHCreateDirectoryExW
shlwapi
PathFileExistsW
PathFindFileNameW
PathFindExtensionW
PathStripToRootW
PathIsUNCW
ole32
CoInitialize
CoInitializeSecurity
CoUninitialize
CoCreateInstance
oleaut32
VariantClear
SysFreeString
SysAllocString
VariantCopy
VariantInit
VariantChangeType
Sections
.text Size: 244KB - Virtual size: 243KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ