Static task
static1
Behavioral task
behavioral1
Sample
997fb6ad9d9282f6a5d6bcb183267eea1ba27c4e61b933e2f09198b1c51dcdf7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
997fb6ad9d9282f6a5d6bcb183267eea1ba27c4e61b933e2f09198b1c51dcdf7.exe
Resource
win10v2004-20220812-en
General
-
Target
997fb6ad9d9282f6a5d6bcb183267eea1ba27c4e61b933e2f09198b1c51dcdf7
-
Size
460KB
-
MD5
05527b41096cafaf003ab0e3751368a6
-
SHA1
0377745bccb77cc21d6f01bd1712b3a64fc81d60
-
SHA256
997fb6ad9d9282f6a5d6bcb183267eea1ba27c4e61b933e2f09198b1c51dcdf7
-
SHA512
b9b417234f46c7145e12529d813a32880451c604c76b817c53da6468ee2d280634d85cad79921199492127d8df242a8c2705cea999b971d0a2d2b4d6a93e571d
-
SSDEEP
6144:Ni3oaD5mECeDvq/tKOMn0P8e0xjZjgi8/gR03EphvS2i+yGRHj1/B/70/x0rdBTr:6oaRMKOz8e0xjZ+gq3ohv2+yWiMTZL
Malware Config
Signatures
Files
-
997fb6ad9d9282f6a5d6bcb183267eea1ba27c4e61b933e2f09198b1c51dcdf7.exe windows x86
0716d982fb15a7de559aa55ae00a0094
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetDeviceCaps
CreateDCA
IntersectClipRect
DeleteDC
SetWindowOrgEx
GetClipBox
OffsetWindowOrgEx
GetTextExtentPoint32W
RectVisible
GetBkMode
CreatePen
GetObjectA
SetWindowExtEx
user32
SetFocus
CreateWindowExA
RegisterClassA
GetWindowTextA
EndDialog
CloseClipboard
RegisterClassExA
CopyRect
LoadIconA
ShowWindow
CreatePopupMenu
MessageBeep
IsWindow
IsCharAlphaNumericA
GrayStringA
SetCursor
KillTimer
GetCapture
DefWindowProcA
SetWindowPos
PeekMessageA
DestroyIcon
EnableMenuItem
MessageBoxA
LoadBitmapA
PostMessageA
DestroyMenu
ScreenToClient
GetClassInfoExA
LoadAcceleratorsA
MoveWindow
InvalidateRgn
ReleaseDC
DestroyWindow
GetParent
GetDC
ScrollWindow
ClientToScreen
SetForegroundWindow
kernel32
CreateEventA
GetConsoleOutputCP
FindFirstFileA
VirtualQuery
HeapCreate
GetLastError
QueryPerformanceCounter
LeaveCriticalSection
GlobalHandle
WideCharToMultiByte
ExitProcess
SetEnvironmentVariableA
ReadFile
GetACP
HeapReAlloc
GetEnvironmentStringsW
IsValidLocale
GlobalSize
lstrcpynW
IsValidCodePage
EnterCriticalSection
GetStdHandle
UnhandledExceptionFilter
CompareStringW
CreateFileA
IsDebuggerPresent
GlobalDeleteAtom
HeapDestroy
HeapSize
LCMapStringW
WriteConsoleA
SetLastError
CompareStringA
VirtualProtect
MulDiv
DeleteFileA
GetModuleHandleA
GetModuleFileNameA
MultiByteToWideChar
GetTimeZoneInformation
CreateMutexA
GetCPInfo
SetUnhandledExceptionFilter
InterlockedDecrement
GetCurrentProcessId
GetCurrentThreadId
SetFileAttributesA
GetProcessHeap
WriteConsoleW
WriteFile
CreateFileW
TlsAlloc
GetOEMCP
CopyFileA
GlobalFree
CreateProcessA
lstrcpynA
VirtualFree
GetConsoleCP
SetFilePointer
GetTimeFormatA
TlsSetValue
GlobalMemoryStatus
InitializeCriticalSection
TlsFree
GetFileAttributesA
InterlockedIncrement
FreeEnvironmentStringsW
lstrcmpA
GetProcAddress
FreeEnvironmentStringsA
GlobalLock
GetSystemTimeAsFileTime
CloseHandle
DeleteCriticalSection
FlushFileBuffers
VirtualAlloc
FatalAppExitA
RtlUnwind
GlobalAlloc
GetFileType
GetLocaleInfoW
EnumSystemLocalesA
GetStartupInfoA
FreeLibrary
GetTickCount
InterlockedExchange
GetUserDefaultLCID
HeapFree
GetLocaleInfoA
TerminateProcess
GetEnvironmentStrings
GetCurrentProcess
GetCommandLineA
lstrlenA
GetCurrentDirectoryA
SetHandleCount
HeapAlloc
LoadLibraryA
SetConsoleCtrlHandler
TlsGetValue
FindResourceA
GetVersionExA
Sleep
GetStringTypeW
GetConsoleMode
GetDriveTypeA
GetCurrentThread
GetStringTypeA
lstrcmpiA
SetStdHandle
GetDateFormatA
LCMapStringA
GetEnvironmentVariableA
GetFileTime
mfc42
ord1576
shell32
SHGetPathFromIDListA
DragAcceptFiles
ord155
SHBrowseForFolderA
oleaut32
LoadTypeLi
ole32
OleFlushClipboard
CoTaskMemFree
Sections
.text Size: 100KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256KB - Virtual size: 254KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ