Static task
static1
Behavioral task
behavioral1
Sample
f5d432e3a0771359e64e1414daa4dc25b03b093d42d43e8a1ddd8175eb8013fe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f5d432e3a0771359e64e1414daa4dc25b03b093d42d43e8a1ddd8175eb8013fe.exe
Resource
win10v2004-20220812-en
General
-
Target
f5d432e3a0771359e64e1414daa4dc25b03b093d42d43e8a1ddd8175eb8013fe
-
Size
232KB
-
MD5
e89809f16d68ce136418b58b2d900813
-
SHA1
4ad3f3126af2b3f941fda4ee502fc9eca633d97d
-
SHA256
f5d432e3a0771359e64e1414daa4dc25b03b093d42d43e8a1ddd8175eb8013fe
-
SHA512
169a3be595bab5018a604352ebcecbf0a499316db53199a8bbba891c6c7ec3a05deed41482337bcce7feaa71f62e390f472c6f22c24f3f27dc059eb21f58169c
-
SSDEEP
6144:xKG4OFgEit0jjjjMrMrMvw61o+tyCynPkkmQB9RwzDBf3cLq5vqyW/7e4Z44BJHW:kKU
Malware Config
Signatures
Files
-
f5d432e3a0771359e64e1414daa4dc25b03b093d42d43e8a1ddd8175eb8013fe.exe windows x86
9fdf32b30270f7c91b879d3a6818c468
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileMappingA
GetModuleFileNameW
GetPrivateProfileStringW
WritePrivateProfileStringW
QueryPerformanceFrequency
QueryPerformanceCounter
CreateThread
GetCurrentProcessId
Sleep
GetVersionExW
WideCharToMultiByte
GlobalAlloc
UnmapViewOfFile
VirtualAllocEx
ReadProcessMemory
VirtualFreeEx
VirtualAlloc
MapViewOfFile
OpenFileMappingA
GetSystemTimeAsFileTime
GetCurrentThreadId
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
CloseHandle
GetTickCount
OpenProcess
GetVolumeInformationW
GetSystemDirectoryW
GetModuleHandleW
GetCurrentProcess
GetProcAddress
GlobalFree
user32
GetWindowLongW
GetParent
wsprintfW
GetDC
ReleaseDC
SendMessageW
LoadCursorW
RegisterClassExW
SetPropW
RegisterClassW
GetPropW
SetWindowTextW
SetFocus
EndPaint
EndDialog
GetSystemMetrics
CreateWindowExW
ShowWindow
LoadIconW
SetWindowLongW
FindWindowW
SendMessageA
GetWindowTextW
FindWindowExW
DispatchMessageW
BeginPaint
TranslateMessage
GetAsyncKeyState
TranslateAcceleratorW
DefWindowProcW
GetMessageW
DestroyWindow
LoadAcceleratorsW
DialogBoxParamW
LoadStringW
SetForegroundWindow
InvalidateRect
SetWindowPos
UnregisterHotKey
GetWindowThreadProcessId
WindowFromPoint
KillTimer
GetCursorPos
GetForegroundWindow
SetTimer
MessageBoxW
RegisterHotKey
SetWindowsHookExW
SendInput
CallNextHookEx
PostMessageW
UpdateWindow
CallWindowProcW
gdi32
SetBkColor
TextOutW
CreateSolidBrush
SelectObject
CreateFontW
SetTextColor
GetStockObject
RoundRect
SetBkMode
shell32
ShellExecuteA
gdiplus
GdipDrawLineI
GdipDrawEllipse
GdipDeletePen
GdipCreatePen1
GdipSetSmoothingMode
GdipDeleteGraphics
GdipCreateFromHDC
GdiplusStartup
GdipSetPenColor
comctl32
ord17
psapi
GetModuleFileNameExW
wininet
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
shlwapi
StrStrIA
msvcr80
_initterm_e
_initterm
_wcmdln
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
wcscpy_s
memmove
sprintf_s
exit
_wtoi
wcstoul
wcscat_s
??3@YAXPAX@Z
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
memcpy
__set_app_type
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_except_handler4_common
_invoke_watson
_controlfp_s
memset
?terminate@@YAXXZ
Sections
.text Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ