Static task
static1
Behavioral task
behavioral1
Sample
65e399fb345b9252673b628bb4ab496b67f36f6bfd51212aaad53393e5e8de56.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
65e399fb345b9252673b628bb4ab496b67f36f6bfd51212aaad53393e5e8de56.exe
Resource
win10v2004-20220812-en
General
-
Target
65e399fb345b9252673b628bb4ab496b67f36f6bfd51212aaad53393e5e8de56
-
Size
595KB
-
MD5
08845e0fe887f32ce09387cbd45706d2
-
SHA1
3d089e228bfba966173f467be769a8540317a9a1
-
SHA256
65e399fb345b9252673b628bb4ab496b67f36f6bfd51212aaad53393e5e8de56
-
SHA512
bffb25efc871a823034ced62f535a05e335bdc74247da9ab8247411be79f7e80a9013a4a3c00908cb6ad24eeed32f45a33ce1b6f4b689e0260cc86499050ad94
-
SSDEEP
12288:u7Kdt6frouQSkhO++KdVR41YtmFmTtsyg7A:5t6EuQSkhOfKdVYsmUxsyg
Malware Config
Signatures
Files
-
65e399fb345b9252673b628bb4ab496b67f36f6bfd51212aaad53393e5e8de56.exe windows x86
60ffdf7d1158f948c8587239b339a819
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CreateWindowExW
IsCharAlphaNumericA
SetMenuContextHelpId
MessageBoxA
wsprintfA
FlashWindowEx
RegisterClassExA
ShowWindow
DestroyWindow
EndDialog
LoadAcceleratorsA
DdeCmpStringHandles
GetCaretPos
GetClipboardSequenceNumber
EmptyClipboard
SetWindowTextW
OpenDesktopW
CallWindowProcA
DdeInitializeW
DefWindowProcA
GetTabbedTextExtentW
RegisterClassA
ScrollWindowEx
SetDoubleClickTime
SetWindowContextHelpId
EnumWindowStationsW
GetKBCodePage
DefMDIChildProcA
EnumDisplayDevicesW
CloseWindowStation
advapi32
CryptGetDefaultProviderA
RegQueryMultipleValuesA
RegQueryValueExA
ReportEventA
LogonUserW
RegSetValueA
comctl32
ImageList_SetOverlayImage
ImageList_Copy
InitCommonControlsEx
shell32
SHGetSpecialFolderPathW
ExtractIconExA
SheChangeDirExW
FindExecutableA
SHFormatDrive
kernel32
TlsAlloc
GetThreadContext
GetFullPathNameA
FreeEnvironmentStringsA
IsValidLocale
CreateWaitableTimerW
WaitNamedPipeW
ContinueDebugEvent
SetStdHandle
GetModuleFileNameA
HeapCreate
GetTimeFormatA
GetPrivateProfileStringW
DebugBreak
GetNamedPipeInfo
EnterCriticalSection
CompareStringA
GetStringTypeA
OpenMutexA
CreateMailslotA
FileTimeToSystemTime
GetUserDefaultLCID
DeleteCriticalSection
GetVersionExW
ExitProcess
MultiByteToWideChar
IsValidCodePage
FindNextFileW
lstrcmpA
GetLastError
GetACP
TlsGetValue
GetStartupInfoA
ExpandEnvironmentStringsW
GetEnvironmentStrings
EnumSystemLocalesA
IsBadWritePtr
LCMapStringA
HeapDestroy
WriteConsoleOutputCharacterA
CreateDirectoryExA
AddAtomW
EnumCalendarInfoA
WaitForMultipleObjectsEx
WriteFileEx
GetCommandLineA
CloseHandle
FindResourceW
InterlockedExchange
CompareStringW
SetFilePointer
WritePrivateProfileStringW
WriteFile
RtlUnwind
GetModuleHandleA
FlushConsoleInputBuffer
FreeEnvironmentStringsW
GetTimeZoneInformation
GetCurrentProcess
LocalAlloc
LeaveCriticalSection
VirtualAlloc
HeapReAlloc
GetFileType
ReadFile
lstrcpyA
SetLastError
VirtualProtect
GetLogicalDriveStringsA
LCMapStringW
GetLocaleInfoW
GetDateFormatA
CopyFileExA
RaiseException
RemoveDirectoryW
GetSystemTimeAdjustment
HeapSize
GetStringTypeW
GetEnvironmentStringsW
GetTickCount
VirtualQuery
UnhandledExceptionFilter
ReadFileEx
HeapFree
GetFileAttributesExW
GetCurrentProcessId
SetConsoleTitleA
WaitForSingleObjectEx
GetCurrentThread
GetDiskFreeSpaceW
GetSystemInfo
GetCPInfo
FindResourceExA
GetOEMCP
OpenProcess
GetFullPathNameW
GlobalFree
GetCurrentThreadId
lstrcpyn
HeapAlloc
InitializeCriticalSection
GetFileAttributesW
EnumTimeFormatsW
SetHandleCount
GetVersionExA
GlobalGetAtomNameA
CreateFileA
ReleaseSemaphore
VirtualFree
LoadLibraryA
GetProcAddress
TerminateProcess
GlobalSize
QueryPerformanceCounter
GetLocaleInfoA
GetConsoleOutputCP
LoadLibraryExW
GetPrivateProfileSectionW
OpenWaitableTimerW
GetVolumeInformationW
TlsSetValue
CreateMutexA
GetTempPathW
TlsFree
GetSystemTimeAsFileTime
GetStdHandle
GlobalAddAtomW
SetEnvironmentVariableA
GetPrivateProfileStringA
WideCharToMultiByte
FlushFileBuffers
wininet
DeleteUrlCacheEntry
ShowX509EncodedCertificate
InternetOpenW
InternetSecurityProtocolToStringA
HttpSendRequestExA
InternetReadFileExW
InternetShowSecurityInfoByURLW
gdi32
ExtEscape
SetArcDirection
SetWinMetaFileBits
Polygon
DeleteObject
GetDIBits
GetCharABCWidthsFloatA
PatBlt
CreatePen
OffsetViewportOrgEx
EndPath
DeleteDC
CreateDCW
SetSystemPaletteUse
CreateDIBPatternBrushPt
UnrealizeObject
GetDeviceCaps
CreateRectRgn
CopyMetaFileA
GetCharacterPlacementA
CreateDIBPatternBrush
GetObjectA
DeleteMetaFile
SetBoundsRect
GetBkMode
GdiGetBatchLimit
Sections
.text Size: 161KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 246KB - Virtual size: 246KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 117KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ