Static task
static1
Behavioral task
behavioral1
Sample
4b000a26e366f4174f5151a22a30079be869de1c22f86181b526674af78190f2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4b000a26e366f4174f5151a22a30079be869de1c22f86181b526674af78190f2.exe
Resource
win10v2004-20220812-en
General
-
Target
4b000a26e366f4174f5151a22a30079be869de1c22f86181b526674af78190f2
-
Size
280KB
-
MD5
93f2fc32d2abc8e81ae8e66d80091c70
-
SHA1
fd44d6c07cce35d069f1ae1a04a48b64935f2847
-
SHA256
4b000a26e366f4174f5151a22a30079be869de1c22f86181b526674af78190f2
-
SHA512
f5c457f43e536b8c4c0cd5559c31eb87e6b1b1d7e8b8c73e094092f8d28a31b696c7ebd5390c0ff9eded91a1535c5c97b882ec50b533aff5f9ae954861250701
-
SSDEEP
6144:SzPhXHyGrnPxsXIBUGUxALialQuHipq3hX6IZrZ+o:SzPhXHnjPxGIBjUAnp6q34QZR
Malware Config
Signatures
Files
-
4b000a26e366f4174f5151a22a30079be869de1c22f86181b526674af78190f2.exe windows x86
61ee7cb4bb175c09749bb32c46dad19f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
comctl32
ImageList_Draw
ImageList_Remove
ImageList_Create
CreateToolbarEx
ord17
ImageList_ReplaceIcon
kernel32
GetFileAttributesA
WideCharToMultiByte
GetModuleFileNameA
OutputDebugStringA
LoadLibraryA
InterlockedDecrement
CreateFileA
SetEndOfFile
GetOEMCP
GetACP
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
ReadFile
GetStringTypeW
GetStringTypeA
GetCPInfo
FlushFileBuffers
SetStdHandle
SetFilePointer
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
GetWindowsDirectoryA
FreeEnvironmentStringsA
HeapSize
UnhandledExceptionFilter
TerminateProcess
TlsGetValue
SetLastError
TlsAlloc
FindFirstFileA
LCMapStringW
WritePrivateProfileStringA
WriteFile
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
ExitProcess
GetCommandLineA
GetStartupInfoA
ExitThread
TlsSetValue
CreateThread
ResumeThread
InterlockedIncrement
HeapReAlloc
RtlUnwind
HeapAlloc
HeapFree
SearchPathA
GetVersion
GetModuleHandleA
GetProcAddress
LocalAlloc
lstrcmpA
LocalFree
ExpandEnvironmentStringsA
FormatMessageA
lstrcpyA
lstrlenA
lstrcatA
GetTickCount
FindNextFileA
FindClose
OpenProcess
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
DeleteFileA
GetPrivateProfileStringA
GetCurrentThreadId
WriteProfileStringA
GetCurrentProcess
GetLastError
CloseHandle
GetProfileStringA
CreateDirectoryA
SetFileAttributesA
MoveFileA
RemoveDirectoryA
LCMapStringA
MultiByteToWideChar
FreeEnvironmentStringsW
RaiseException
user32
PtInRect
BeginPaint
DispatchMessageA
EndPaint
DrawFrameControl
TranslateMessage
TranslateAcceleratorA
GetMessageA
GetClassNameA
DeferWindowPos
LoadAcceleratorsA
CreateDialogParamA
BeginDeferWindowPos
EnumChildWindows
EndDeferWindowPos
GetWindowLongA
SetWindowLongA
DrawMenuBar
LoadStringA
PostQuitMessage
DialogBoxParamA
LoadCursorA
GetSysColorBrush
ChildWindowFromPoint
InvalidateRect
EndDialog
TrackPopupMenu
EnableMenuItem
DeleteMenu
GetSubMenu
InsertMenuA
SetDlgItemTextA
RegisterClassExA
FindWindowA
WaitForInputIdle
GetWindowThreadProcessId
SetForegroundWindow
FindWindowExA
CloseClipboard
OpenClipboard
EmptyClipboard
SetClipboardData
LoadIconA
GetMenu
CheckMenuItem
SetWindowTextA
MessageBoxA
SetWindowPos
GetWindowRect
IsIconic
IsZoomed
GetDlgItem
SetTimer
GetParent
SetCursor
GetCursorPos
GetClientRect
CreateWindowExA
SetFocus
CallWindowProcA
GetSysColor
GetSystemMetrics
GetFocus
GetDC
SendMessageA
DrawTextA
ReleaseDC
MoveWindow
ShowWindow
ClientToScreen
ScreenToClient
PostMessageA
DestroyWindow
DefWindowProcA
LoadImageA
EnumDisplaySettingsA
IsDialogMessageA
gdi32
GetObjectA
CreateFontIndirectA
GetStockObject
SetBkColor
ExtTextOutA
GetTextExtentPoint32A
SelectObject
SetTextColor
SetBkMode
CreateSolidBrush
comdlg32
GetSaveFileNameA
advapi32
RegEnumKeyA
RegLoadKeyA
RegOpenKeyExA
RegCloseKey
RegUnLoadKeyA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyA
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegQueryValueA
RegDeleteValueA
RegQueryInfoKeyA
RegEnumKeyExA
RegEnumValueA
DeleteService
CloseServiceHandle
OpenServiceA
OpenSCManagerA
AllocateAndInitializeSid
FreeSid
EqualSid
LookupAccountSidA
GetTokenInformation
RegDeleteKeyA
shell32
ShellExecuteA
SHGetFileInfoA
ShellExecuteExA
ole32
CoInitialize
CoTaskMemFree
CoCreateInstance
oleaut32
VariantClear
SysAllocString
SysFreeString
Sections
.text Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE