Static task
static1
Behavioral task
behavioral1
Sample
5006be2f4b66ae8e50e1cc5f74cd87cd33b5775964c5b3f3a9fd69b83637b7ad.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5006be2f4b66ae8e50e1cc5f74cd87cd33b5775964c5b3f3a9fd69b83637b7ad.exe
Resource
win10v2004-20220901-en
General
-
Target
5006be2f4b66ae8e50e1cc5f74cd87cd33b5775964c5b3f3a9fd69b83637b7ad
-
Size
288KB
-
MD5
92c416023bbef4ab5dac6d364f0da780
-
SHA1
d050764316010b5377100bc1c7f2dce068c25cd7
-
SHA256
5006be2f4b66ae8e50e1cc5f74cd87cd33b5775964c5b3f3a9fd69b83637b7ad
-
SHA512
bc1093f78cdd836ab7cd159dfef08a6f002711040d1bb9ec1a8c10e6831f96d8836c4355664a34055753c9db5e57cc726925d0b0f6ce75f98f63ed14fd8fa2ff
-
SSDEEP
3072:j3pS+XvK3OSEakLZmSd7M7fHjFvTEZdCpHu9l5CxKaSEMmlKwG9UdYD6XkwT4ZSG:kYmqeHjZQZdaHKKrSEMAGqv0x5oTc
Malware Config
Signatures
Files
-
5006be2f4b66ae8e50e1cc5f74cd87cd33b5775964c5b3f3a9fd69b83637b7ad.exe windows x86
e1b5351985a0284e6f90b4f4639779bd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalReAlloc
TlsFree
InterlockedIncrement
SetErrorMode
GetCPInfo
GetOEMCP
HeapFree
HeapAlloc
VirtualAlloc
HeapReAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
ExitThread
CreateThread
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
ExitProcess
RaiseException
HeapSize
SetStdHandle
GetFileType
HeapDestroy
HeapCreate
TlsSetValue
GetStdHandle
GetACP
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetTickCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GlobalFlags
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
InterlockedDecrement
GetFileTime
CreateFileA
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
GetThreadLocale
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
FormatMessageA
LocalFree
SuspendThread
SetThreadPriority
WritePrivateProfileStringA
GlobalAddAtomA
GetCurrentProcessId
SetLastError
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
GetModuleFileNameA
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryA
lstrcmpA
FreeLibrary
GlobalDeleteAtom
GetModuleHandleA
GetProcAddress
FreeResource
ResumeThread
CloseHandle
ResetEvent
GlobalFree
GlobalUnlock
MulDiv
CreateEventA
GlobalAlloc
SetEvent
GlobalLock
DeleteFileA
GetTempPathA
FindNextFileA
LockResource
FindClose
FindFirstFileA
GetModuleFileNameW
GetFileAttributesA
SizeofResource
Sleep
WaitForSingleObject
LoadResource
FindResourceA
GetVersion
CompareStringA
CreateMutexA
GetLastError
InterlockedExchange
MultiByteToWideChar
CompareStringW
WideCharToMultiByte
lstrlenA
VirtualFree
user32
LoadCursorA
GetSysColorBrush
ShowWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
GetWindowPlacement
GetWindowRect
UnhookWindowsHookEx
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetWindow
SetFocus
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
DestroyMenu
UnregisterClassA
SetCursor
PostQuitMessage
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
FillRect
GetDC
SetRect
InvalidateRect
ReleaseDC
GetSysColor
CopyRect
IsIconic
LoadIconA
DrawIcon
FindWindowExA
GetClientRect
SendMessageA
GetWindowTextA
EnumChildWindows
IsWindow
PostMessageA
GetSystemMetrics
EnableWindow
FindWindowA
CharUpperA
SystemParametersInfoA
gdi32
ScaleWindowExtEx
GetStockObject
SetWindowExtEx
GetObjectA
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
CreateSolidBrush
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
BitBlt
DeleteDC
GetDeviceCaps
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
RegQueryValueA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
shell32
ShellExecuteExA
SHGetSpecialFolderLocation
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderPathA
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameA
UrlUnescapeA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
ole32
CoCreateInstance
CoUninitialize
CoInitialize
CreateStreamOnHGlobal
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
OleLoadPicture
SysAllocString
SysStringLen
SysFreeString
VariantClear
VariantChangeType
VariantInit
wininet
InternetQueryDataAvailable
HttpOpenRequestA
InternetOpenUrlA
InternetConnectA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
InternetErrorDlg
FtpGetFileA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
Sections
.text Size: 208KB - Virtual size: 207KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ