Static task
static1
Behavioral task
behavioral1
Sample
14fc2d58d41c80ee2c52fa60baf430e66c93365234ad9a9ef5a4b90c9402c5a8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
14fc2d58d41c80ee2c52fa60baf430e66c93365234ad9a9ef5a4b90c9402c5a8.exe
Resource
win10v2004-20220812-en
General
-
Target
14fc2d58d41c80ee2c52fa60baf430e66c93365234ad9a9ef5a4b90c9402c5a8
-
Size
168KB
-
MD5
05eb438dce726f6248e022389a796240
-
SHA1
99c47cc6eba336fd4af700f6b73489749486452d
-
SHA256
14fc2d58d41c80ee2c52fa60baf430e66c93365234ad9a9ef5a4b90c9402c5a8
-
SHA512
7a54e0c67c4485b355a4ea8fc327eedde11b127a625ff0448904d1b3229fd24fc1755ee4903a1638efcc6f71ef17978333a7ddbd62bb95e48892e01bca571585
-
SSDEEP
3072:IBz4lMwLnn0gRfiTV9Ma1Wxh8OatpNz8Dn+rRpMYAhGTvVf9ClW:Yz4lMYDRfCKaEb87Nz8D+1pXAhknCl
Malware Config
Signatures
Files
-
14fc2d58d41c80ee2c52fa60baf430e66c93365234ad9a9ef5a4b90c9402c5a8.exe windows x86
c486806cd6e8407e615a03bbedb96066
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsDebuggerPresent
GetTickCount
GetEnvironmentStringsW
VirtualAlloc
GetModuleHandleA
WriteFileEx
TryEnterCriticalSection
LockResource
CompareStringW
GlobalFree
ReadFileEx
DeleteFileW
WaitForMultipleObjectsEx
CloseHandle
lstrlenA
GetFileAttributesW
InterlockedExchange
SetFilePointer
DeleteFileA
GetThreadLocale
GetVersionExA
SleepEx
GlobalLock
FormatMessageW
WaitForSingleObject
GetFileAttributesA
lstrlenW
SetErrorMode
GlobalAlloc
CreateEventW
SetStdHandle
CreateEventA
GlobalUnlock
RegisterWaitForSingleObject
SizeofResource
LoadResource
FormatMessageA
CompareStringA
FreeLibrary
GetSystemInfo
HeapDestroy
WaitForSingleObjectEx
GetStartupInfoA
user32
DestroyWindow
GetKeyState
MoveWindow
DrawFocusRect
ShowWindowAsync
SetWindowLongW
InflateRect
AdjustWindowRectEx
SetWindowLongA
OffsetRect
ClientToScreen
ReleaseCapture
UnregisterClassA
SetCapture
LoadStringA
GetCursorPos
CreateWindowExA
GetForegroundWindow
LoadCursorW
DefWindowProcW
SetMenuItemInfoW
TranslateMessage
GetWindowTextW
GetWindowWord
SetMenuItemBitmaps
DestroyIcon
AllowSetForegroundWindow
GetActiveWindow
DestroyMenu
PostMessageW
GetMenuStringW
PtInRect
SetActiveWindow
SetMenuItemInfoA
GetMenuItemCount
MessageBeep
DefWindowProcA
RegisterClassA
GetClientRect
LoadIconW
GetMenu
SetWindowPos
SendMessageA
CheckMenuItem
CreateWindowExW
SetWindowTextW
SetWindowTextA
ReleaseDC
PostMessageA
GetSubMenu
TrackPopupMenu
ole32
CoRevokeMallocSpy
CoRegisterChannelHook
CoSuspendClassObjects
CoTaskMemRealloc
CoSetProxyBlanket
CoUninitialize
CoTaskMemAlloc
CoTaskMemFree
CoTreatAsClass
CoRevokeClassObject
CoSwitchCallContext
CoReleaseMarshalData
CoRegisterMessageFilter
CoRegisterPSClsid
CoRegisterSurrogate
CoRevokeInitializeSpy
CoReleaseServerProcess
CoResumeClassObjects
CoRevertToSelf
CoRegisterMallocSpy
CoRegisterClassObject
shell32
SHBindToParent
msvcrt
__setusermatherr
_except_handler3
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
_onexit
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
__dllonexit
Sections
.text Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128KB - Virtual size: 227KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ