Static task
static1
Behavioral task
behavioral1
Sample
51110ed385be60ad0074f63d36e8d8d6c18afc2f3efac6e6c24b93bae077339f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
51110ed385be60ad0074f63d36e8d8d6c18afc2f3efac6e6c24b93bae077339f.exe
Resource
win10v2004-20220901-en
General
-
Target
51110ed385be60ad0074f63d36e8d8d6c18afc2f3efac6e6c24b93bae077339f
-
Size
1.3MB
-
MD5
136b86daf3654a81391f250bfae040a8
-
SHA1
0f7389cab9ec8423be47b1e3bba49c33488baeb5
-
SHA256
51110ed385be60ad0074f63d36e8d8d6c18afc2f3efac6e6c24b93bae077339f
-
SHA512
692fdef3e6d6f114f5a723088ff265b1ba5e54589cb8c2bbb29c25a810641c097359f9b6e6a35548915f10b54bb65f38bc44c796b3d4771afbaf54c5c3edc208
-
SSDEEP
24576:6uAmLlEbO9Jx8C5gHfB5XqNw5iXsLpR9cwvmiummRT+t:6uAav9JxFg/z+wHOyxm
Malware Config
Signatures
Files
-
51110ed385be60ad0074f63d36e8d8d6c18afc2f3efac6e6c24b93bae077339f.exe windows x86
a941f34587b8f10bda3a3f13ed03ec9c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetMapMode
SetMapMode
LPtoDP
GetDeviceCaps
GetStockObject
DPtoLP
kernel32
GetTempPathA
CreateProcessA
GetLastError
WaitForSingleObject
ReleaseMutex
GetLocalTime
FreeLibrary
GetProcAddress
LoadLibraryA
SetEvent
SetFileAttributesA
CloseHandle
CreateEventA
MulDiv
GetModuleHandleA
ContinueDebugEvent
SetThreadContext
GetThreadContext
TerminateProcess
WaitForDebugEvent
GetStartupInfoA
GetTickCount
WriteFile
ReadFile
CreateFileA
CopyFileA
Process32Next
OpenProcess
Process32First
CreateToolhelp32Snapshot
Sleep
Module32First
MoveFileA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetVersionExA
CreateThread
GetModuleFileNameA
TerminateThread
GetCommandLineA
CreateMutexA
GetEnvironmentVariableA
LocalAlloc
GetProcessHeap
SetEndOfFile
SetEnvironmentVariableA
CompareStringW
CompareStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
FlushFileBuffers
SetStdHandle
SetFilePointer
GetExitCodeProcess
FindFirstFileA
DeleteFileA
FindNextFileA
FindClose
GetWindowsDirectoryA
ResetEvent
GetCurrentProcessId
CreateDirectoryA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
GetSystemTimeAsFileTime
HeapAlloc
GetModuleHandleW
ExitProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
RtlUnwind
HeapFree
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
WideCharToMultiByte
GetTimeZoneInformation
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
GetStdHandle
GetFileAttributesA
SetHandleCount
GetFileType
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetConsoleCP
GetConsoleMode
InterlockedExchange
InitializeCriticalSectionAndSpinCount
HeapSize
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetFullPathNameA
GetCurrentDirectoryA
FreeEnvironmentStringsA
user32
CreateIconFromResourceEx
MessageBoxA
ShowWindow
GetTitleBarInfo
GetDesktopWindow
GetWindowRect
MoveWindow
SetWindowTextA
BeginPaint
EndPaint
InvalidateRect
UpdateWindow
SetFocus
GetWindowDC
LoadCursorA
RegisterClassExA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
DefWindowProcA
PostQuitMessage
advapi32
RegSetValueExA
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
ole32
CreateStreamOnHGlobal
shell32
Shell_NotifyIconA
oleaut32
OleLoadPicture
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 161KB - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE