Static task
static1
Behavioral task
behavioral1
Sample
54e61ccd8697cae94b109e7d6c13e84b803e37c5b8b587f513d12c34a9ec5693.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
54e61ccd8697cae94b109e7d6c13e84b803e37c5b8b587f513d12c34a9ec5693.exe
Resource
win10v2004-20220901-en
General
-
Target
54e61ccd8697cae94b109e7d6c13e84b803e37c5b8b587f513d12c34a9ec5693
-
Size
258KB
-
MD5
136de92f7e0907149b7e35e3bc3f3b70
-
SHA1
b7ce03c96f27c51b62de605260069124774ae650
-
SHA256
54e61ccd8697cae94b109e7d6c13e84b803e37c5b8b587f513d12c34a9ec5693
-
SHA512
dccea48a551a3498c5ca4a0697a2d5afa3e4e8fde8077ee672b9d433c309e346f39c1a1f460efcf02937cee47ae557e95e77d96d44d5e63acad6e0de9c1f7678
-
SSDEEP
6144:3QcwfFBvPeyGOHk7A68E1j04q3jgp/Xt9M+HJ7MZokCcV:AlTu0cCE1aUpft9M+VMKk
Malware Config
Signatures
Files
-
54e61ccd8697cae94b109e7d6c13e84b803e37c5b8b587f513d12c34a9ec5693.exe windows x86
d4c8d59ad108249342d536a1b9ec5aa1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetClientRect
GetActiveWindow
GetKeyState
GetMenuItemInfoA
IsWindowEnabled
IsChild
GetCursor
GetDlgItem
CreateWindowExA
GetMenu
FillRect
HideCaret
FrameRect
BeginDeferWindowPos
GetClassLongA
ClientToScreen
GetCapture
DefFrameProcA
SetWindowPos
DefWindowProcA
DrawIcon
GetKeyNameTextA
EnumChildWindows
CharLowerA
DispatchMessageA
CallWindowProcA
GetMenuState
CharToOemA
SetCursor
GetDCEx
GetSysColor
EnableMenuItem
EnableWindow
GetFocus
GetScrollInfo
RegisterClassA
GetLastActivePopup
FindWindowA
IsWindowVisible
SetWindowLongA
GetScrollRange
SystemParametersInfoA
DrawEdge
CheckMenuItem
DefMDIChildProcA
CreatePopupMenu
CharLowerBuffA
GetScrollPos
GetMenuStringA
CreateIcon
EndDeferWindowPos
BeginPaint
IsMenu
ShowWindow
GetForegroundWindow
GetMenuItemCount
GetWindowTextA
DrawTextA
GetMessagePos
GetDesktopWindow
EnableScrollBar
GetSubMenu
DrawFrameControl
DrawIconEx
GetIconInfo
GetParent
GetClassInfoA
EnumThreadWindows
DrawMenuBar
TrackPopupMenu
CharNextA
CreateMenu
GetDC
EndPaint
EqualRect
ShowScrollBar
CallNextHookEx
SetTimer
EnumWindows
GetWindow
SetWindowTextA
GetSysColorBrush
oleaut32
SysAllocStringLen
RegisterTypeLib
OleLoadPicture
SysFreeString
VariantCopyInd
SafeArrayGetElement
SysReAllocStringLen
SafeArrayGetUBound
GetErrorInfo
msvcrt
strcmp
strncmp
memmove
pow
sprintf
memcpy
wcsncmp
wcstol
atol
memset
rand
wcscspn
exit
gdi32
BitBlt
GetDIBits
RestoreDC
SaveDC
SelectObject
ntdll
wcscat
shell32
SHGetDiskFreeSpaceA
SHGetDesktopFolder
SHGetSpecialFolderLocation
DragQueryFileA
SHGetFolderPathA
kernel32
GlobalFindAtomA
GetDiskFreeSpaceA
VirtualQuery
SetEndOfFile
GetVersion
InitializeCriticalSection
ExitThread
WriteFile
CompareStringA
GetCurrentProcess
GetCPInfo
GetCommandLineA
HeapFree
lstrcmpA
GetFileSize
GetProcAddress
LocalFree
SetLastError
SetEvent
GetLocalTime
GetFullPathNameA
ReadFile
lstrcpynA
FreeLibrary
SetHandleCount
GetTickCount
CloseHandle
GetProcessHeap
GetThreadLocale
Sleep
lstrcatA
GetLocaleInfoA
LockResource
FreeResource
MoveFileExA
FindClose
VirtualAllocEx
lstrcpyA
GetModuleFileNameA
MoveFileA
WaitForSingleObject
lstrlenA
GetLastError
GetSystemDefaultLangID
GetUserDefaultLCID
GetFileAttributesA
GetEnvironmentStrings
CreateThread
VirtualAlloc
FormatMessageA
LocalReAlloc
GetStartupInfoA
LocalAlloc
GetFileType
GlobalAlloc
GetVersionExA
LoadLibraryExA
GetStringTypeW
EnumCalendarInfoA
LoadLibraryA
CreateEventA
ResetEvent
DeleteFileA
SetThreadLocale
ExitProcess
GetStringTypeA
VirtualFree
GetStdHandle
MulDiv
SizeofResource
lstrcmpiA
GlobalDeleteAtom
GetCurrentProcessId
GetOEMCP
GetACP
WideCharToMultiByte
HeapAlloc
GetCurrentThreadId
EnterCriticalSection
GetModuleHandleA
comctl32
ImageList_DragShowNolock
ImageList_Remove
ImageList_Destroy
ImageList_DrawEx
ImageList_Read
ImageList_Write
ImageList_Add
comdlg32
GetSaveFileNameA
ChooseColorA
GetFileTitleA
FindTextA
Sections
text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tls Size: 204KB - Virtual size: 203KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE