Static task
static1
Behavioral task
behavioral1
Sample
a003e74d15410727c92662ff01c407c13bf83d224a48d59a1f624ee4de629ff1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a003e74d15410727c92662ff01c407c13bf83d224a48d59a1f624ee4de629ff1.exe
Resource
win10v2004-20220812-en
General
-
Target
a003e74d15410727c92662ff01c407c13bf83d224a48d59a1f624ee4de629ff1
-
Size
1.2MB
-
MD5
06e17045f971df08a54980029ec60de0
-
SHA1
9a3ce26cb9da29c8f7289e0e347f505127a41a7d
-
SHA256
a003e74d15410727c92662ff01c407c13bf83d224a48d59a1f624ee4de629ff1
-
SHA512
655e6250a9c892ae280f2b145236e91de34ac2d7a150acc10c07b72d3b10f2d49faa6b30a6f22b537333f603b8bdac0b800640207f554bde026ef6894504dc5d
-
SSDEEP
24576:bGp4iIEwo9zlln9GRcwENwU7rbQICqsYcq4cq283fU1++PBQ:bzi/zlzkcwl6r43q4cq787JQ
Malware Config
Signatures
Files
-
a003e74d15410727c92662ff01c407c13bf83d224a48d59a1f624ee4de629ff1.exe windows x86
300645871b195dd721d8003898585327
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowRect
RegisterClassExA
IsIconic
GetKeyNameTextA
GetClassInfoExA
GetFocus
GetParent
SetParent
GetClientRect
ExitWindowsEx
SetFocus
GetWindowTextLengthA
InflateRect
GetForegroundWindow
CreateDialogIndirectParamA
SetPropA
SetWindowLongA
IntersectRect
GetWindowLongA
GetDlgItem
ScrollWindow
DefWindowProcA
GetDesktopWindow
GetCursorPos
CreatePopupMenu
GetSysColorBrush
AppendMenuA
SetWindowTextA
CallWindowProcA
DialogBoxIndirectParamA
FindWindowA
EndDeferWindowPos
GetWindow
gdi32
LineTo
SetTextColor
SetBkColor
ExcludeClipRect
CreateBitmap
SetBkMode
GetCharWidthA
GetClipBox
MoveToEx
kernel32
WriteConsoleA
ReadFile
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeW
GetConsoleOutputCP
GetLocaleInfoA
HeapSize
CloseHandle
SetFilePointer
FlushFileBuffers
GetConsoleMode
GetConsoleCP
HeapReAlloc
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
WriteConsoleW
SetStdHandle
GetLocaleInfoW
CreateFileA
GetStringTypeA
UnhandledExceptionFilter
GetCurrentProcess
FindCloseChangeNotification
VirtualFree
SetSystemTimeAdjustment
CreateProcessA
CreateDirectoryA
VirtualAlloc
RemoveDirectoryA
CopyFileA
SetFileAttributesA
ResetEvent
GetLocalTime
LoadLibraryA
FindNextChangeNotification
FindFirstChangeNotificationA
VirtualProtect
GetFileTime
GetCurrentThreadId
GetCurrentProcessId
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
GetLastError
RaiseException
RtlUnwind
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
GetProcAddress
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetACP
GetOEMCP
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
Sections
.text Size: 84KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 242KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024KB - Virtual size: 91.2MB
IMAGE_SCN_MEM_READ