Static task
static1
Behavioral task
behavioral1
Sample
f650b32bc5b808f7906fdbcc059698b6438f43ec2fa6671e304a96db43e24d81.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f650b32bc5b808f7906fdbcc059698b6438f43ec2fa6671e304a96db43e24d81.exe
Resource
win10v2004-20220812-en
General
-
Target
f650b32bc5b808f7906fdbcc059698b6438f43ec2fa6671e304a96db43e24d81
-
Size
696KB
-
MD5
092ba8f8446a46440966c3973040a425
-
SHA1
4893e83fd1125bf21b5793b74b9139efccab92b3
-
SHA256
f650b32bc5b808f7906fdbcc059698b6438f43ec2fa6671e304a96db43e24d81
-
SHA512
baf982063dc413629f34ab05b5748749d2b769e7ba4cee10109da0ec6a9faf5d49edde35e4040d544eae4e54b3f65eff4d4178ba1d266545ea275a749a0078e8
-
SSDEEP
12288:tnbREtw17xBkVtFe7hCnj+kRdRGyCHuDFch8VWi8odw7vmVP/PG:tnF6y12UMjrTQHIW8VX8MqvmVP2
Malware Config
Signatures
Files
-
f650b32bc5b808f7906fdbcc059698b6438f43ec2fa6671e304a96db43e24d81.exe windows x86
9be7bc520b3a9e9738c21f8fb3c81aee
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoA
VerQueryValueA
shell32
DragAcceptFiles
SHGetMalloc
Shell_NotifyIconA
ShellExecuteA
SHAppBarMessage
ord155
comctl32
InitCommonControlsEx
_TrackMouseEvent
ImageList_Add
gdi32
SelectObject
Escape
SelectClipRgn
Arc
TextOutW
ScaleViewportExtEx
EndDoc
ExtFloodFill
CreateDIBSection
PtInRegion
SetWindowOrgEx
GetTextColor
GetDeviceCaps
EnumFontFamiliesExW
CreatePolygonRgn
SetAbortProc
SetWindowExtEx
CreateFontIndirectW
CreateDCW
ExcludeClipRect
SelectPalette
SetBkMode
SetTextAlign
DeleteObject
IntersectClipRect
CreateRectRgnIndirect
CreateCompatibleBitmap
GetStockObject
SetViewportExtEx
GetDIBits
BeginPath
GetTextMetricsW
GetMapMode
CreatePalette
StretchBlt
GetClipBox
CreateBitmap
CombineRgn
GetObjectW
Ellipse
EndPage
SetStretchBltMode
CreateFontW
DPtoLP
CreatePatternBrush
LineTo
RectVisible
GetBkMode
GetViewportExtEx
GetTextMetricsA
RestoreDC
EndPath
SetTextColor
StartPage
SetPixel
PtVisible
OffsetViewportOrgEx
SetBkColor
RoundRect
CreateSolidBrush
SaveDC
OffsetRgn
SetROP2
GetTextExtentPoint32W
GetBkColor
CreatePen
GetWindowExtEx
ExtSelectClipRgn
RealizePalette
PatBlt
StretchDIBits
ExtTextOutW
GetRgnBox
SetViewportOrgEx
Polygon
AbortDoc
BitBlt
ScaleWindowExtEx
MoveToEx
CreateCompatibleDC
Polyline
Rectangle
SetMapMode
CreateBrushIndirect
SetBrushOrgEx
GetPixel
SetPolyFillMode
CreateRectRgn
DeleteDC
kernel32
FatalAppExitA
TlsFree
VirtualQuery
InterlockedIncrement
TlsSetValue
WideCharToMultiByte
SetFilePointer
VirtualFree
IsValidCodePage
GlobalFree
GetConsoleCP
OutputDebugStringA
UnhandledExceptionFilter
LockFile
LocalFileTimeToFileTime
MultiByteToWideChar
GetConsoleMode
LoadLibraryA
GetSystemTimeAsFileTime
FlushFileBuffers
LoadResource
GetLocaleInfoA
GetOEMCP
DuplicateHandle
MulDiv
GetStringTypeA
lstrcpynA
IsValidLocale
GetCurrentThreadId
GetFileType
SetConsoleCtrlHandler
InterlockedDecrement
GetStartupInfoW
CreateMutexW
FreeEnvironmentStringsW
HeapCreate
FreeEnvironmentStringsA
GetProcessHeap
GetModuleHandleW
GetCurrentThread
GetStartupInfoA
TlsGetValue
WriteConsoleW
CreateMutexA
WriteConsoleA
LeaveCriticalSection
GetProcAddress
GetTempPathA
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetUserDefaultLCID
GetCPInfo
GetStdHandle
HeapFree
lstrcmpA
GetVersionExA
HeapReAlloc
LCMapStringW
ReadFile
HeapAlloc
GetLastError
SystemTimeToFileTime
CompareStringW
GetTimeFormatA
GetEnvironmentStringsW
GetConsoleOutputCP
GetModuleFileNameW
CloseHandle
TlsAlloc
GetLocaleInfoW
CopyFileW
RaiseException
IsDebuggerPresent
CreateFileW
GetTimeZoneInformation
Sleep
GlobalUnlock
FileTimeToSystemTime
HeapDestroy
SetStdHandle
CompareFileTime
DeleteCriticalSection
SetEvent
GetACP
GetEnvironmentStrings
UnlockFile
FreeLibrary
GetStringTypeW
lstrlenW
SetEnvironmentVariableA
GetDateFormatA
LocalFree
GetModuleHandleA
GetModuleFileNameA
TerminateProcess
GetFileSize
GetCommandLineA
FindClose
SuspendThread
RtlUnwind
DeleteFileA
InitializeCriticalSection
ExitProcess
VirtualAlloc
CreateFileA
SizeofResource
CompareStringA
WriteFile
LCMapStringA
GetCurrentProcess
GetCommandLineW
HeapSize
SetHandleCount
SetCurrentDirectoryA
EnterCriticalSection
GetCurrentProcessId
SetLastError
GetCurrentDirectoryA
GetTickCount
InterlockedExchange
advapi32
RegQueryValueExA
OpenThreadToken
AllocateAndInitializeSid
CloseServiceHandle
InitializeSecurityDescriptor
GetUserNameA
SetSecurityDescriptorDacl
OpenProcessToken
RegDeleteValueA
DeleteService
ControlService
RegEnumKeyA
RegQueryValueA
FreeSid
RegEnumValueA
RegEnumKeyExA
GetLengthSid
RegOpenKeyA
OpenSCManagerA
RegDeleteKeyA
OpenServiceA
RegQueryInfoKeyA
RegCreateKeyExA
RegSetValueExA
GetTokenInformation
CreateServiceA
RegCreateKeyA
InitializeAcl
RegOpenKeyExA
RegCloseKey
user32
RegisterClassW
SetMenu
GetDlgItem
CreateWindowExW
RegisterClassExW
SetParent
Sections
.text Size: 96KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 452KB - Virtual size: 451KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ