Static task
static1
Behavioral task
behavioral1
Sample
75633211aa8a246420926537ca12c1e53ca688c74fd180694c22adae10989c45.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
75633211aa8a246420926537ca12c1e53ca688c74fd180694c22adae10989c45.exe
Resource
win10v2004-20220812-en
General
-
Target
75633211aa8a246420926537ca12c1e53ca688c74fd180694c22adae10989c45
-
Size
272KB
-
MD5
084fb8609c5ad47b7c8650244095f212
-
SHA1
41fc2c835e78650e67a081c3d3299ef1ac366de3
-
SHA256
75633211aa8a246420926537ca12c1e53ca688c74fd180694c22adae10989c45
-
SHA512
52255510811f2948a8397496a573530a45b066961ac2e4bb1cc8173add87a338e2c562d06d86ef5c4ccd334620cc5ae77ffb064cde8a2799a4e1f9232e98fa3d
-
SSDEEP
6144:YGnDlZ1gRy5tVMjkUDW8oYeaSjgKVULmb:YGDlpEwUDzeTjgKum
Malware Config
Signatures
Files
-
75633211aa8a246420926537ca12c1e53ca688c74fd180694c22adae10989c45.exe windows x86
53a6c64cb851e367e3222e9d26d2ce10
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadMenuA
IntersectRect
IsIconic
EnableMenuItem
DestroyMenu
FillRect
PtInRect
RedrawWindow
RegisterClassA
GetDlgItem
IsWindowUnicode
LoadStringA
CreateWindowExA
PeekMessageA
GetWindowThreadProcessId
SetTimer
EndDialog
UnhookWindowsHookEx
IsZoomed
GetNextDlgTabItem
GetWindowRect
MapWindowPoints
BeginPaint
PostMessageA
ReuseDDElParam
CheckMenuItem
SetWindowPos
TranslateAcceleratorA
DefWindowProcA
ReleaseCapture
MessageBoxA
KillTimer
DrawFrameControl
EndPaint
RegisterClassExA
LoadIconA
EnableWindow
EnumWindows
wsprintfA
GetSystemMetrics
GetWindowTextA
CallNextHookEx
ReleaseDC
OffsetRect
GetDlgItemInt
SetWindowLongA
ScrollWindow
LoadBitmapA
SetRectEmpty
GetCursorPos
GetWindowLongA
DispatchMessageA
GetScrollInfo
CharNextA
ShowWindow
GetClientRect
UnregisterClassA
ScreenToClient
DestroyIcon
LoadCursorA
DestroyWindow
CallWindowProcA
GetForegroundWindow
SetWindowsHookExA
GetWindow
GetFocus
GetMenuState
GetClassNameA
InvalidateRgn
GetCapture
comctl32
InitCommonControlsEx
ImageList_Destroy
_TrackMouseEvent
ord17
ole32
CreateILockBytesOnHGlobal
OleCreateFromData
StringFromGUID2
CoGetClassObject
CreateDataAdviseHolder
OleUninitialize
StgCreateDocfileOnILockBytes
CoTaskMemFree
OleSetClipboard
StgOpenStorageOnILockBytes
OleFlushClipboard
WriteClassStg
SetConvertStg
ReadFmtUserTypeStg
CLSIDFromProgID
RevokeDragDrop
WriteFmtUserTypeStg
CreateItemMoniker
ReadClassStg
CLSIDFromString
CoTaskMemAlloc
CoTreatAsClass
winspool.drv
DocumentPropertiesA
EnumPrintersA
kernel32
TlsGetValue
GetConsoleCP
GetProcAddress
GetCurrentThreadId
SetLastError
GetACP
GetProcessHeap
GetSystemTimeAsFileTime
RaiseException
IsValidCodePage
GetStringTypeW
VirtualQuery
SetUnhandledExceptionFilter
ExitProcess
EnterCriticalSection
TlsAlloc
GetModuleFileNameA
GetCurrentProcessId
GetCurrentProcess
WideCharToMultiByte
GetVersionExA
DeleteCriticalSection
TlsFree
CloseHandle
WriteFile
InitializeCriticalSection
HeapFree
InterlockedExchange
RtlUnwind
CreateFileA
Sleep
UnhandledExceptionFilter
VirtualAlloc
GetConsoleOutputCP
TerminateProcess
HeapCreate
FreeEnvironmentStringsA
GetDateFormatA
GetEnvironmentStrings
InterlockedIncrement
GetOEMCP
GetStdHandle
LeaveCriticalSection
SetFilePointer
QueryPerformanceCounter
LCMapStringW
GetTickCount
SetEnvironmentVariableA
TlsSetValue
ReadFile
WriteConsoleA
GetCommandLineA
LCMapStringA
SetHandleCount
CreateMutexA
GetCPInfo
HeapReAlloc
IsDebuggerPresent
GetFileType
HeapSize
VirtualFree
CompareStringW
GetTimeZoneInformation
HeapAlloc
FreeEnvironmentStringsW
CompareStringA
GetModuleHandleA
GetStringTypeA
FlushFileBuffers
MultiByteToWideChar
InterlockedDecrement
HeapDestroy
SetStdHandle
GetStartupInfoA
WriteConsoleW
GetEnvironmentStringsW
GetLocaleInfoA
GetLastError
GetConsoleMode
GetTimeFormatA
LoadLibraryA
shell32
ShellExecuteExA
DragQueryFileA
DragFinish
SHGetMalloc
comdlg32
ChooseColorA
CommDlgExtendedError
advapi32
SetSecurityDescriptorDacl
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
GetSidSubAuthority
GetTokenInformation
GetSidSubAuthorityCount
RegOpenKeyExA
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
InitializeSecurityDescriptor
OpenProcessToken
GetUserNameA
RegGetKeySecurity
RegSetValueExW
RegCloseKey
RegEnumKeyW
RegDeleteValueW
wininet
InternetGetLastResponseInfoA
InternetOpenA
InternetReadFile
HttpEndRequestA
HttpOpenRequestA
InternetConnectA
HttpSendRequestExA
HttpAddRequestHeadersA
InternetCloseHandle
HttpQueryInfoA
HttpSendRequestA
InternetSetFilePointer
InternetQueryDataAvailable
gdi32
SetBkMode
GetDIBits
DeleteObject
ExcludeClipRect
StretchBlt
CreateSolidBrush
RealizePalette
GetBkColor
CreateFontA
DeleteEnhMetaFile
CreateRectRgnIndirect
PatBlt
SetStretchBltMode
GetDeviceCaps
TextOutA
GetTextExtentPoint32A
OffsetRgn
GdiFlush
GetObjectA
SetPixel
SetTextColor
ExtSelectClipRgn
SetDIBitsToDevice
LineTo
oleaut32
LoadTypeLi
Sections
.text Size: 108KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 60KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ