Static task
static1
Behavioral task
behavioral1
Sample
4b5ce83156a6fbae38a91c7d23f8c6f4548df53d80460f72fbc52c7d4be83b48.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4b5ce83156a6fbae38a91c7d23f8c6f4548df53d80460f72fbc52c7d4be83b48.exe
Resource
win10v2004-20220812-en
General
-
Target
4b5ce83156a6fbae38a91c7d23f8c6f4548df53d80460f72fbc52c7d4be83b48
-
Size
300KB
-
MD5
124c2eed7440c5872c7266df6054ed24
-
SHA1
2e3788a21c88d1e6691b22a660e74e0b9f1c29cf
-
SHA256
4b5ce83156a6fbae38a91c7d23f8c6f4548df53d80460f72fbc52c7d4be83b48
-
SHA512
7870bed80d8357d1bf093bb3625ba2270a98877c48057dfa114927025ef1cea442edfbf3f153ab4bdb6688acfc53319768ca2b5fa35ecb39f1e89b384e893034
-
SSDEEP
3072:8MCbTlj3Td/kHkGJBbMGVXmsB/+mtIpcutu1wWKaK0tGcjcTpSObltGcjcTpSObf:8MCbZ7TdE1b9X//r+1QcI29cI2f
Malware Config
Signatures
Files
-
4b5ce83156a6fbae38a91c7d23f8c6f4548df53d80460f72fbc52c7d4be83b48.exe windows x86
5d6b5cafee043c414bd3f92630d3b583
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetWindowsDirectoryA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
FlushInstructionCache
GetCurrentProcess
GetCurrentThreadId
GetLastError
InterlockedIncrement
SetLastError
FreeLibrary
SizeofResource
LoadResource
LoadLibraryA
GetModuleFileNameA
LocalFree
FormatMessageA
WriteFile
GetLocalTime
GetSystemTime
SetFilePointer
DeleteFileA
CloseHandle
GetFileSize
CreateFileA
GetSystemDirectoryA
LockResource
GetUserDefaultLangID
UnmapViewOfFile
MapViewOfFile
CreateToolhelp32Snapshot
GetSystemDefaultLangID
lstrlenA
ReadFile
FileTimeToDosDateTime
InterlockedDecrement
OpenProcess
GlobalMemoryStatus
CompareStringA
GetModuleHandleA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
LocalAlloc
SetEnvironmentVariableA
SetEndOfFile
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeA
LCMapStringA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetCommandLineW
GetCommandLineA
GetEnvironmentStrings
TlsFree
FreeEnvironmentStringsA
GetTimeZoneInformation
GetConsoleMode
GetConsoleCP
Sleep
ExitProcess
HeapCreate
TlsSetValue
TlsAlloc
TlsGetValue
GetOEMCP
GetFileInformationByHandle
RaiseException
InterlockedCompareExchange
HeapFree
GetProcessHeap
HeapAlloc
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
HeapDestroy
HeapReAlloc
HeapSize
GetVersionExA
GetSystemTimeAsFileTime
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualQuery
user32
TranslateMessage
EndDialog
UnregisterClassA
ShowWindow
PostQuitMessage
DestroyWindow
GetSystemMetrics
MessageBeep
SetFocus
GetDlgItem
IsDlgButtonChecked
CheckRadioButton
IsWindow
GetLastActivePopup
IsIconic
IsWindowVisible
SetForegroundWindow
SetActiveWindow
GetActiveWindow
GetWindow
GetWindowRect
GetClientRect
MapWindowPoints
SetWindowPos
GetParent
shell32
SHGetMalloc
SHGetSpecialFolderLocation
ole32
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
CoUninitialize
CoInitialize
CoTaskMemAlloc
oleaut32
VarUI4FromStr
VariantClear
comctl32
InitCommonControlsEx
Sections
.text Size: 160KB - Virtual size: 159KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 96KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ