Static task
static1
Behavioral task
behavioral1
Sample
50dd5c5e877fc004c486592756096b8b43f40983f7fd008e52ca8d15b743977f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
50dd5c5e877fc004c486592756096b8b43f40983f7fd008e52ca8d15b743977f.exe
Resource
win10v2004-20220812-en
General
-
Target
50dd5c5e877fc004c486592756096b8b43f40983f7fd008e52ca8d15b743977f
-
Size
316KB
-
MD5
0f82583caaf2e720f49fa0131d289c90
-
SHA1
8bc92eef41101b3f5be54dc2d672edefe48d5f8f
-
SHA256
50dd5c5e877fc004c486592756096b8b43f40983f7fd008e52ca8d15b743977f
-
SHA512
52ab2d1a2595be4beabc9a3496f7c73e1742bea0c262fbc6b9209d06daefd32222481ae5e39bb4c196a1940fe59e801e62d2b9dcddf477ccf6e66ae5b48c7b08
-
SSDEEP
6144:JUIVE055N67rbzzR6eLCpKIxdrxJ8mBxq9kFKW/yuj:VleLnIDxJvD8kEbuj
Malware Config
Signatures
Files
-
50dd5c5e877fc004c486592756096b8b43f40983f7fd008e52ca8d15b743977f.exe windows x86
4e12e189af910585025b6950860a20bb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
IsDialogMessageA
LoadBitmapA
CheckDlgButton
SendMessageTimeoutA
SetWindowTextA
GetIconInfo
GetMessageA
CloseClipboard
EndDialog
OffsetRect
ReleaseCapture
LoadIconA
kernel32
FreeEnvironmentStringsW
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
HeapSize
CreateProcessA
GetStartupInfoA
DeleteFileA
FlushFileBuffers
CreateThread
LocalFree
LocalAlloc
CloseHandle
GetFileSize
SetFilePointer
CreateFileA
DeleteCriticalSection
Sleep
GetTickCount
FreeLibrary
LoadLibraryA
GetProcAddress
SetTapeParameters
GetWindowsDirectoryA
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleA
ExitProcess
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSection
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualAlloc
HeapReAlloc
GetConsoleCP
GetConsoleMode
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
Sections
.text Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 750KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ