Static task
static1
Behavioral task
behavioral1
Sample
47c7b96b08e38042999f813ca7b4a62a3e8857b7fa5f7498cab2c4ba66b8cc54.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
47c7b96b08e38042999f813ca7b4a62a3e8857b7fa5f7498cab2c4ba66b8cc54.exe
Resource
win10v2004-20220901-en
General
-
Target
47c7b96b08e38042999f813ca7b4a62a3e8857b7fa5f7498cab2c4ba66b8cc54
-
Size
544KB
-
MD5
063f4e85415699cbc0414503739e96c2
-
SHA1
c08bfa7eebb6b0a419a16e552f6013dac3d54ffb
-
SHA256
47c7b96b08e38042999f813ca7b4a62a3e8857b7fa5f7498cab2c4ba66b8cc54
-
SHA512
5572569c9f7d463bd2e6f9575a938414fc5dffd247867812a81134369b37b2e6a986d42089de68db38475cd7652690f2e0df2bd02f66eed0667ebf3d753d2065
-
SSDEEP
12288:nTq3+Cdb7rPC0hDOuMLRBTR0K9e6cYetE8h0FA42O/bGeP:nTqOCdXLC0B0BTR2fW8CFA4N/S
Malware Config
Signatures
Files
-
47c7b96b08e38042999f813ca7b4a62a3e8857b7fa5f7498cab2c4ba66b8cc54.exe windows x86
34a782c26c78a40cdc7bc94ea0f003c9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DrawAnimatedRects
MoveWindow
ChangeDisplaySettingsExA
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowTextW
GetClipboardSequenceNumber
EnumDesktopWindows
CreateWindowExA
LoadCursorA
CallNextHookEx
GetDC
ChangeMenuW
LoadIconA
MessageBoxW
SetRectEmpty
GetDlgCtrlID
GetComboBoxInfo
DlgDirListA
GetWindowInfo
UnionRect
IsWindowUnicode
ActivateKeyboardLayout
SetCursor
DestroyWindow
RegisterClassA
EnumPropsExA
DefWindowProcW
GetProcessDefaultLayout
OpenClipboard
ShowWindow
SendDlgItemMessageA
RegisterClassExA
comctl32
DestroyPropertySheetPage
ImageList_SetOverlayImage
ImageList_SetBkColor
CreateStatusWindowW
ImageList_Read
ImageList_DragShowNolock
ImageList_Create
ImageList_SetDragCursorImage
ImageList_GetIconSize
CreateStatusWindow
ImageList_LoadImageW
CreatePropertySheetPageA
MakeDragList
ImageList_DrawEx
ImageList_BeginDrag
DrawStatusText
ImageList_SetIconSize
ImageList_Remove
InitCommonControlsEx
CreatePropertySheetPageW
ImageList_DragMove
ImageList_DragEnter
ImageList_Copy
_TrackMouseEvent
ImageList_LoadImageA
kernel32
SetLastError
GetConsoleTitleA
VirtualQuery
GetLocaleInfoA
EnumResourceNamesW
ReadFile
GlobalUnfix
FormatMessageW
WriteFile
GetWindowsDirectoryA
GetStringTypeExW
UnhandledExceptionFilter
RtlFillMemory
HeapReAlloc
VirtualFree
GetProfileSectionA
SetStdHandle
CreateMutexW
WaitForSingleObjectEx
GetSystemTime
GetEnvironmentStrings
OpenMutexA
GetLocalTime
RtlUnwind
GetPrivateProfileStringW
IsBadWritePtr
GetLogicalDriveStringsW
TlsAlloc
ExitProcess
MultiByteToWideChar
GetStartupInfoA
CompareStringA
FreeLibrary
GetCommandLineA
MapViewOfFile
LocalFileTimeToFileTime
GetVersion
ReleaseMutex
GetDiskFreeSpaceW
WaitCommEvent
GetStringTypeExA
SetHandleCount
HeapFree
TlsFree
ResetEvent
GetCurrentProcess
SetEvent
VirtualAlloc
GetTimeZoneInformation
SetWaitableTimer
GetExitCodeThread
DeleteCriticalSection
SetCurrentDirectoryW
HeapCreate
lstrcatW
LoadLibraryA
CompareStringW
CloseHandle
GetEnvironmentVariableW
GetProcessAffinityMask
GetCurrentThread
GetAtomNameA
SetComputerNameW
EnumCalendarInfoA
FindFirstFileA
TlsGetValue
GetOEMCP
LocalHandle
GetCPInfo
FindFirstFileExW
HeapAlloc
LoadModule
TerminateProcess
CreateMutexA
GetPrivateProfileIntA
lstrcmpA
GetCurrentThreadId
GetExitCodeProcess
FillConsoleOutputCharacterA
PulseEvent
InitializeCriticalSection
GetStringTypeW
LoadResource
FlushFileBuffers
QueryPerformanceCounter
WideCharToMultiByte
FreeEnvironmentStringsA
CreateMailslotW
EnterCriticalSection
GetPrivateProfileSectionW
CreateFileA
TlsSetValue
EnumSystemCodePagesA
LCMapStringA
SetLocalTime
GetVersionExA
GlobalLock
GetStdHandle
LeaveCriticalSection
GetModuleHandleA
RemoveDirectoryA
SystemTimeToFileTime
SetEnvironmentVariableA
GetStringTypeA
GetProcAddress
SetThreadIdealProcessor
lstrcmpW
GetProfileStringW
EnumCalendarInfoExW
LocalSize
GetLastError
InterlockedExchange
MoveFileExA
EnumTimeFormatsA
GetFileType
FreeEnvironmentStringsW
CreatePipe
GetModuleFileNameA
FindFirstFileW
SetFilePointer
GetTickCount
lstrcpynW
GetACP
SetSystemTime
DebugActiveProcess
GetConsoleCP
GlobalAddAtomW
HeapDestroy
LCMapStringW
WritePrivateProfileStructW
CreateWaitableTimerA
InterlockedIncrement
GetCurrentProcessId
GetSystemTimeAsFileTime
SetConsoleTitleW
CreateEventA
WriteConsoleInputW
InterlockedDecrement
GetTempFileNameA
SetFileAttributesW
GetEnvironmentStringsW
shell32
SHEmptyRecycleBinA
ShellExecuteExW
ExtractIconExW
SHEmptyRecycleBinW
Sections
.text Size: 140KB - Virtual size: 139KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 252KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ