ExecuteCrop
Static task
static1
Behavioral task
behavioral1
Sample
459e5404191e99538d88d08e6802d1b7b66afe8e334e511c96e968b8fa679b9e.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
459e5404191e99538d88d08e6802d1b7b66afe8e334e511c96e968b8fa679b9e.dll
Resource
win10v2004-20220812-en
General
-
Target
459e5404191e99538d88d08e6802d1b7b66afe8e334e511c96e968b8fa679b9e
-
Size
332KB
-
MD5
93baa4fd80bd9540962dc8940b0ce2c4
-
SHA1
c2be32e2f01e1b7cd0194e4a1b89a7e33bfa1d6f
-
SHA256
459e5404191e99538d88d08e6802d1b7b66afe8e334e511c96e968b8fa679b9e
-
SHA512
c4c9ef5b909db027945f75041de09f39ec15721891a33a7c58e07ba2d458d6245b82f52b161b23930d7fb81de3ffb63651e922ce01d8daea81b644be1d5ef158
-
SSDEEP
6144:bi1WA4VOZ1Q3JmpywTUhMF94xA1i2GoBt0yYYOoLVq:uxZn/94xA1bdq
Malware Config
Signatures
Files
-
459e5404191e99538d88d08e6802d1b7b66afe8e334e511c96e968b8fa679b9e.dll windows x86
33b791c1ddb031533967ad445d6685b3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
InterlockedExchange
GetVersion
CompareStringA
WideCharToMultiByte
GetModuleFileNameA
GetFileAttributesA
FindClose
lstrlenA
FindFirstFileA
FreeLibrary
GetProcAddress
LoadLibraryA
DeleteFileA
CopyFileA
ExitThread
WaitForSingleObject
ResumeThread
CreateFileA
WriteFile
ReadFile
SetFilePointer
CloseHandle
LocalFree
FormatMessageA
LCMapStringW
LCMapStringA
GetConsoleMode
GetConsoleCP
IsValidCodePage
GetACP
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
GetStdHandle
VirtualFree
HeapCreate
HeapDestroy
Sleep
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
HeapSize
RaiseException
ExitProcess
CreateThread
RtlUnwind
GetProcessHeap
GetCommandLineA
VirtualAlloc
HeapReAlloc
HeapAlloc
HeapFree
GetCurrentProcess
FlushFileBuffers
GetThreadLocale
GetOEMCP
GetCPInfo
InterlockedIncrement
GlobalFlags
WritePrivateProfileStringA
SetErrorMode
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
SetThreadPriority
GetCurrentThreadId
SetEvent
SuspendThread
CreateEventA
SizeofResource
LockResource
LoadResource
FindResourceA
SetLastError
GetCurrentProcessId
GetModuleHandleA
GlobalAlloc
lstrcmpA
GlobalLock
GetLocaleInfoA
EnumResourceLanguagesA
ConvertDefaultLocale
GetCurrentThread
GlobalDeleteAtom
GetVersionExA
lstrcmpW
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
FreeResource
GlobalFree
GlobalUnlock
GetModuleFileNameW
InterlockedDecrement
MulDiv
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
GetLastError
user32
EnableWindow
GetDesktopWindow
GetDlgItem
EndPaint
BeginPaint
ClientToScreen
GrayStringA
SendMessageA
DestroyMenu
GetWindowTextA
DispatchMessageA
PeekMessageA
TranslateMessage
GetWindowLongA
SetWindowTextA
ValidateRect
GetCursorPos
GetKeyState
IsWindowVisible
GetActiveWindow
GetMessageA
CallNextHookEx
SetWindowsHookExA
SetCursor
MessageBoxA
IsWindowEnabled
GetLastActivePopup
GetParent
GetWindowThreadProcessId
PostQuitMessage
PostMessageA
GetWindow
GetSystemMetrics
GetWindowRect
GetWindowPlacement
IsIconic
SystemParametersInfoA
SetWindowPos
SetWindowLongA
CallWindowProcA
DefWindowProcA
PtInRect
CopyRect
AdjustWindowRectEx
GetSysColor
RegisterClassA
GetClassInfoA
GetClassInfoExA
CreateWindowExA
GetMenuItemCount
GetMenuItemID
GetSubMenu
GetMenu
GetClientRect
UpdateWindow
SetForegroundWindow
MapWindowPoints
GetMessagePos
GetMessageTime
UnhookWindowsHookEx
DestroyWindow
GetTopWindow
SetActiveWindow
GetForegroundWindow
SetFocus
IsWindow
GetFocus
RemovePropA
GetPropA
SetPropA
GetClassNameA
GetClassLongA
GetCapture
WinHelpA
SendDlgItemMessageA
LoadIconA
RegisterWindowMessageA
CheckMenuItem
EnableMenuItem
GetMenuState
ModifyMenuA
LoadBitmapA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
EndDialog
GetNextDlgTabItem
CreateDialogIndirectParamA
IsDialogMessageA
ShowWindow
GetDC
ReleaseDC
UnregisterClassA
GetSysColorBrush
LoadCursorA
TabbedTextOutA
DrawTextA
DrawTextExA
GetDlgCtrlID
shell32
SHGetSpecialFolderPathA
DoEnvironmentSubstA
shlwapi
PathAddBackslashA
PathFindExtensionA
PathFindFileNameA
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyA
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
gdi32
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
SetTextColor
SetBkColor
GetObjectA
CreateBitmap
GetDeviceCaps
SaveDC
RestoreDC
SetMapMode
DeleteObject
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
oleaut32
VariantInit
VariantChangeType
VariantClear
Exports
Exports
Sections
.text Size: 148KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 84KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ