Static task
static1
Behavioral task
behavioral1
Sample
4e0aeaa35d68e2e78b65197c8b68af7d44f021b9ff656e5c3316432781007aa5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4e0aeaa35d68e2e78b65197c8b68af7d44f021b9ff656e5c3316432781007aa5.exe
Resource
win10v2004-20220901-en
General
-
Target
4e0aeaa35d68e2e78b65197c8b68af7d44f021b9ff656e5c3316432781007aa5
-
Size
99KB
-
MD5
074c64a769ad4d76a14bbab7b5e456d0
-
SHA1
fa9f151109ee1de0c4f818b4a7cd413e195d6614
-
SHA256
4e0aeaa35d68e2e78b65197c8b68af7d44f021b9ff656e5c3316432781007aa5
-
SHA512
6c3e9feb0a7d2a5dece32b5bbf8d70b212fcd9de608a1f2b33fc162d99f595c1bae7155175e4dcafe078a7b29e700694f70c55690235b63804687eb17a155cf6
-
SSDEEP
1536:PNyWuGxVZgCfuE4Y92dfW2jbJKyZIwLbbL3A+C4:PNeGV3fCK2dfZbsqIwLbfA+
Malware Config
Signatures
Files
-
4e0aeaa35d68e2e78b65197c8b68af7d44f021b9ff656e5c3316432781007aa5.exe windows x86
e36a16ac9b0e42c57b618a4d53569951
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
DeleteObject
SetBkColor
SetTextColor
GetLayout
SetBkMode
CreatePen
SelectObject
MoveToEx
LineTo
user32
SendMessageTimeoutW
ReleaseDC
FindWindowW
IsIconic
PostMessageW
MessageBoxW
LoadStringW
ShowCursor
GetSysColor
GetMonitorInfoW
LoadIconW
GetDC
EnumDisplayMonitors
GetSystemMetrics
ChangeDisplaySettingsExW
EnumDisplaySettingsExW
MessageBeep
DefWindowProcW
GetSysColorBrush
CreateWindowExW
PostQuitMessage
EndPaint
SetForegroundWindow
InvalidateRect
LoadCursorW
RegisterClassExW
ShowWindow
GetMessageW
TranslateMessage
DispatchMessageW
UnregisterClassW
MoveWindow
DestroyWindow
BeginPaint
DrawTextW
msvcrt
_cexit
_wcslwr
fopen
__CxxFrameHandler3
fprintf
fclose
_controlfp
_except_handler4_common
_wcsnicmp
?terminate@@YAXXZ
_onexit
_lock
__dllonexit
_unlock
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_wcmdln
exit
_XcptFilter
_exit
memcpy
__wgetmainargs
??2@YAPAXI@Z
??3@YAXPAX@Z
_vsnprintf
_vsnwprintf
free
wcstoul
wcstok
_wcsdup
malloc
wcschr
memset
_wcsicmp
??_V@YAXPAX@Z
wcsstr
??_U@YAPAXI@Z
wcstol
ntdll
EtwTraceMessage
EtwGetTraceEnableFlags
EtwGetTraceEnableLevel
EtwGetTraceLoggerHandle
EtwUnregisterTraceGuids
EtwRegisterTraceGuidsW
api-ms-win-core-errorhandling-l1-1-0
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetLastError
api-ms-win-core-file-l1-1-0
GetFileAttributesA
CreateFileW
api-ms-win-core-handle-l1-1-0
CloseHandle
api-ms-win-core-heap-l1-1-0
HeapSetInformation
api-ms-win-core-interlocked-l1-1-0
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
api-ms-win-core-libraryloader-l1-1-0
GetProcAddress
FreeLibrary
LoadLibraryExA
GetModuleHandleA
GetModuleFileNameW
api-ms-win-core-localregistry-l1-1-0
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegEnumValueW
RegQueryInfoKeyW
api-ms-win-core-misc-l1-1-0
LocalFree
lstrcmpiW
LocalAlloc
Sleep
lstrlenW
api-ms-win-core-processenvironment-l1-1-0
GetCommandLineW
api-ms-win-core-processthreads-l1-1-0
OpenProcessToken
GetStartupInfoW
GetCurrentThreadId
GetCurrentProcessId
TerminateProcess
GetCurrentProcess
OpenThreadToken
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-sysinfo-l1-1-0
GetSystemTimeAsFileTime
GetTickCount
hid
HidD_FreePreparsedData
HidP_MaxUsageListLength
HidD_GetProductString
HidP_GetCaps
HidD_GetPreparsedData
HidD_GetHidGuid
HidP_GetSpecificValueCaps
ole32
CoCreateInstance
CoInitializeEx
CoUninitialize
CoTaskMemFree
imm32
ImmDisableTextFrameService
shell32
ShellExecuteW
CommandLineToArgvW
kernel32
GetCurrentThread
DelayLoadFailureHook
RegisterApplicationRestart
CancelIo
api-ms-win-security-base-l1-1-0
GetTokenInformation
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE