Static task
static1
Behavioral task
behavioral1
Sample
5d3fd0bdfd796bb3866d158c1a38a574309aaa13c9d7088074b8ecd5c4ee1ea2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5d3fd0bdfd796bb3866d158c1a38a574309aaa13c9d7088074b8ecd5c4ee1ea2.exe
Resource
win10v2004-20220812-en
General
-
Target
5d3fd0bdfd796bb3866d158c1a38a574309aaa13c9d7088074b8ecd5c4ee1ea2
-
Size
15KB
-
MD5
05a463e9588219415e3109e0e90aec73
-
SHA1
859be30d12a9a5b556c9075e9e5b9d847ef912bd
-
SHA256
5d3fd0bdfd796bb3866d158c1a38a574309aaa13c9d7088074b8ecd5c4ee1ea2
-
SHA512
2f447cd3c3b025604c9c1878a1200dce0e86e189560013ce507a039660f8fb7c09241a0f23d7d12f183de7c1c3e8fc6c0d8e53fd98598dc989176982e5e4dfe8
-
SSDEEP
384:V7dIn8BqVX2hhtK4d1ij5bzR2LrLdSpo+8dmlaX:V7Sz9WhcrbzR2L1Uo+84+
Malware Config
Signatures
Files
-
5d3fd0bdfd796bb3866d158c1a38a574309aaa13c9d7088074b8ecd5c4ee1ea2.exe windows x86
a8a254011495b0f1253f19e3f6a7df92
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
HeapFree
LoadLibraryA
LoadResource
LocalAlloc
LocalFree
LockResource
MapViewOfFile
MultiByteToWideChar
OpenProcess
ReadFile
RtlMoveMemory
RtlZeroMemory
FindNextFileA
GlobalUnlock
SetFilePointer
SizeofResource
Sleep
UnmapViewOfFile
VirtualAlloc
VirtualFree
WriteFile
lstrcatA
lstrcmpW
lstrcmpiA
lstrcpyA
lstrlenA
FindFirstFileA
GlobalLock
GetVersionExA
GetProcessHeap
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLastError
GetLocalTime
GetFileSize
GetFileAttributesA
GetEnvironmentVariableA
GetCommandLineA
FindClose
FreeResource
FreeLibrary
SetFileAttributesA
FindResourceA
ExitProcess
DeleteFileA
CreateThread
CreateProcessA
CreateMutexA
CreateFileMappingA
CreateFileA
CreateDirectoryA
CopyFileA
SetEndOfFile
CloseHandle
user32
UpdateWindow
TranslateMessage
ToAsciiEx
ShowWindow
SetTimer
SetClipboardViewer
SendMessageA
RegisterRawInputDevices
RegisterClassExA
OpenClipboard
MapVirtualKeyExA
LoadIconA
LoadCursorA
IsClipboardFormatAvailable
GetWindowThreadProcessId
wsprintfA
ChangeClipboardChain
CloseClipboard
CreateWindowExA
DefWindowProcA
GetMessageA
DispatchMessageA
GetClassNameA
GetClipboardData
GetDC
GetForegroundWindow
GetKeyNameTextA
GetKeyboardLayout
GetWindowTextA
GetWindowLongA
GetSystemMetrics
GetRawInputData
GetKeyboardState
shlwapi
PathRenameExtensionA
PathMatchSpecA
PathAddBackslashA
PathFindFileNameA
advapi32
AllocateAndInitializeSid
CryptEncrypt
CryptExportKey
CryptGenKey
CryptReleaseContext
FreeSid
RegCreateKeyExA
RegNotifyChangeKeyValue
RegSetValueExA
CryptAcquireContextA
CheckTokenMembership
CryptDestroyKey
ws2_32
socket
recv
gethostbyname
connect
closesocket
WSAStartup
send
wininet
InternetOpenA
InternetConnectA
InternetCloseHandle
FtpPutFileA
gdi32
CreateCompatibleDC
DeleteDC
DeleteObject
GetDIBits
SelectObject
StretchBlt
CreateDIBSection
gdiplus
GdipDisposeImage
GdipGetImageEncodersSize
GdipLoadImageFromFile
GdipSaveImageToFile
GdiplusShutdown
GdiplusStartup
GdipGetImageEncoders
psapi
GetProcessImageFileNameA
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 340B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE