Static task
static1
Behavioral task
behavioral1
Sample
4604fa47d2162f7ca3a61803da11e15d809001cf8397368bb610bc9d06a88625.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4604fa47d2162f7ca3a61803da11e15d809001cf8397368bb610bc9d06a88625.exe
Resource
win10v2004-20220812-en
General
-
Target
4604fa47d2162f7ca3a61803da11e15d809001cf8397368bb610bc9d06a88625
-
Size
250KB
-
MD5
82a51731786d1c3c8f8229adcc29b810
-
SHA1
5b318df40d76be0e3bef09d5875bfb623ec216a9
-
SHA256
4604fa47d2162f7ca3a61803da11e15d809001cf8397368bb610bc9d06a88625
-
SHA512
189cd32bdffc9431a6a3214abacfe01acd1111896ff43f43bce703861cd28b72fb1dc9acc0081ee3a296cd706bc19dda0ffe59b7238d91ceef2502f9e19505af
-
SSDEEP
3072:0iG47vmfhnT1unjf9tLEciSWEqF1R/plSaRCKj8Hn7z89NbgjZrTtM8M8Z1yuxZR:0i0J4H+rRZRxjc74DbgjNTiwr
Malware Config
Signatures
Files
-
4604fa47d2162f7ca3a61803da11e15d809001cf8397368bb610bc9d06a88625.exe windows x86
dcfdc7429580f85efa556056ff6d1124
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpi
FatalAppExitW
GetCurrentDirectoryW
SetComputerNameW
GetLogicalDrives
LoadLibraryExA
GlobalFindAtomA
GetLogicalDriveStringsW
GetExitCodeProcess
CreateMailslotW
SetCurrentDirectoryW
lstrcpynA
TlsAlloc
DisconnectNamedPipe
GetShortPathNameA
FatalAppExitA
GetVersion
GetEnvironmentVariableA
GetProcAddress
EnumDateFormatsW
AddAtomW
QueryPerformanceCounter
FileTimeToDosDateTime
SearchPathW
CreateMutexW
GetEnvironmentStringsW
GetEnvironmentStringsA
GetCurrentProcessId
GetDiskFreeSpaceA
user32
LoadCursorA
DialogBoxIndirectParamW
CharLowerA
RemoveMenu
UnregisterClassA
GetMenuState
DestroyIcon
CreateDialogIndirectParamW
AdjustWindowRect
SendDlgItemMessageW
IsIconic
GetCapture
mouse_event
SetDlgItemInt
RegisterClassA
GetMenuItemRect
DefWindowProcW
PeekMessageW
SetTimer
SetCapture
CreateDesktopW
GetActiveWindow
MessageBoxA
GetCapture
CopyIcon
GetSysColor
SetFocus
DialogBoxParamW
DialogBoxIndirectParamA
keybd_event
gdi32
StretchDIBits
CreateScalableFontResourceA
CreateFontIndirectW
CreateRoundRectRgn
CreateBitmap
GetMetaFileA
CreateFontIndirectExW
CreateFontIndirectExA
GetTextExtentPointA
advapi32
CryptContextAddRef
shell32
StrCmpNA
StrNCmpA
ShellExecuteExA
StrCmpNIA
StrRChrIA
ShellExecuteEx
FreeIconList
StrStrA
oleaut32
VarI8FromBool
VarDateFromUdate
VarEqv
VarUI4FromR8
CreateStdDispatch
setupapi
CM_Modify_Res_Des_Ex
SetupDiCallClassInstaller
CMP_WaitNoPendingInstallEvents
CM_Open_Class_KeyA
SetupDiGetCustomDevicePropertyA
SetupInstallServicesFromInfSectionA
SetupDiGetClassDevsExA
SetupQueueCopyIndirectA
CM_Reenumerate_DevNode_Ex
MyMalloc
Sections
.hdxskk Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.X Size: 91KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.FxVsb Size: 3KB - Virtual size: 273KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.iijo Size: 5KB - Virtual size: 226KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.peG Size: 2KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.szchAv Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bJPj Size: 2KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.GxsH Size: 3KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ZBQaI Size: 2KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.FJZm Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.wRMZfy Size: 15KB - Virtual size: 235KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.jNEs Size: 3KB - Virtual size: 206KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.I Size: 2KB - Virtual size: 357KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ