Static task
static1
Behavioral task
behavioral1
Sample
1be99fae2957c4cb4e1b0283623d533200dd879312c11a5ea1c40767034568e2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1be99fae2957c4cb4e1b0283623d533200dd879312c11a5ea1c40767034568e2.exe
Resource
win10v2004-20220812-en
General
-
Target
1be99fae2957c4cb4e1b0283623d533200dd879312c11a5ea1c40767034568e2
-
Size
132KB
-
MD5
0effd5ae190c8e58712c0ea18c389d96
-
SHA1
0105ba225f7959d289daccc33e9fc19c8a44db12
-
SHA256
1be99fae2957c4cb4e1b0283623d533200dd879312c11a5ea1c40767034568e2
-
SHA512
2e9c1bd7f9ce6a4a6f91365607b7ebc2576b94df9aa66b1fa58e7a7bfe76c58a338b54aee21603762e32afb87e1784947687423287412156cca13e25e3ed42d0
-
SSDEEP
3072:XQAxTzVrpYouXwaCmBlr4QjW7qi9BU4GePrTDKUWFqsbPv3YKZ:AuTBrsXwy7rHW7qi9BUTeD3KVAaPwK
Malware Config
Signatures
Files
-
1be99fae2957c4cb4e1b0283623d533200dd879312c11a5ea1c40767034568e2.exe windows x86
11a1fd2135b941b6ed83ed7c5b0e9956
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryA
CreateEventA
CreateMutexA
CreateProcessW
DeleteCriticalSection
DeleteFileA
DeleteFileW
DeviceIoControl
EnterCriticalSection
EnumCalendarInfoA
ExitProcess
ExpandEnvironmentStringsA
FileTimeToSystemTime
FindClose
FindFirstFileA
FindResourceA
FormatMessageA
FreeLibrary
FreeResource
GetCPInfo
GetCommandLineW
GetConsoleOutputCP
GetCurrentThread
GetDateFormatA
GetDriveTypeA
GetFileAttributesW
GetFileSize
GetFileType
GetFullPathNameA
GetLocalTime
GetModuleHandleA
GetOEMCP
GetPrivateProfileStringA
GetProcessHeap
GetShortPathNameA
GetStartupInfoA
GetStringTypeA
GetSystemDirectoryW
GetSystemInfo
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempPathA
GetTempPathW
GetThreadLocale
GetTimeZoneInformation
GetWindowsDirectoryA
GlobalAddAtomA
GlobalAlloc
GlobalDeleteAtom
GlobalFindAtomA
GlobalHandle
GlobalReAlloc
GlobalUnlock
HeapFree
InitializeCriticalSection
InterlockedCompareExchange
InterlockedExchange
IsBadCodePtr
IsDebuggerPresent
IsValidCodePage
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadLibraryExW
LoadLibraryW
LoadResource
LocalFileTimeToFileTime
LockResource
MapViewOfFile
MulDiv
MultiByteToWideChar
ResetEvent
SetCurrentDirectoryA
SetEndOfFile
SetEvent
SetFilePointer
SetFileTime
SetLastError
SetStdHandle
SetThreadLocale
SetThreadPriority
Sleep
TerminateThread
TlsAlloc
TlsGetValue
VirtualAlloc
VirtualProtect
WideCharToMultiByte
WriteFile
lstrcmpiA
lstrcmpiW
lstrcpyA
user32
AdjustWindowRectEx
CallWindowProcA
ClientToScreen
CreatePopupMenu
DestroyIcon
DrawEdge
DrawFrameControl
DrawTextA
EnumThreadWindows
FindWindowA
GetClientRect
GetCursorPos
GetDCEx
GetIconInfo
GetKeyState
GetMenuState
GetMessageA
GetMessagePos
GetPropA
GetScrollRange
GetSubMenu
GetSysColor
GetSysColorBrush
GetWindowPlacement
InflateRect
IsRectEmpty
IsWindow
IsWindowEnabled
IsWindowVisible
KillTimer
LoadIconA
MessageBoxA
OemToCharA
OpenClipboard
PostMessageA
PostQuitMessage
RedrawWindow
RegisterClipboardFormatA
RegisterWindowMessageA
ReleaseDC
RemoveMenu
RemovePropA
SetClassLongA
SetMenu
SetPropA
SetScrollPos
SetScrollRange
SetWindowLongA
SystemParametersInfoA
TranslateMessage
UnhookWindowsHookEx
WinHelpA
gdi32
AbortDoc
BeginPath
CloseEnhMetaFile
CloseMetaFile
CombineRgn
CopyEnhMetaFileA
CopyMetaFileA
CreateBrushIndirect
CreateCompatibleBitmap
CreateDCW
CreateDIBitmap
CreateFontW
CreateHalftonePalette
CreateRectRgn
DeleteDC
DeleteEnhMetaFile
DeleteMetaFile
EnumFontsA
ExtCreatePen
ExtEscape
ExtSelectClipRgn
FrameRgn
GdiFlush
GetBitmapBits
GetClipBox
GetCurrentObject
GetDeviceCaps
GetEnhMetaFileDescriptionA
GetObjectA
GetROP2
GetRegionData
GetStretchBltMode
GetTextExtentExPointW
GetTextExtentPoint32A
GetTextFaceA
GetTextFaceW
GetTextMetricsW
InvertRgn
LPtoDP
LineTo
MaskBlt
MoveToEx
OffsetClipRgn
OffsetViewportOrgEx
Pie
PtInRegion
PtVisible
RealizePalette
Rectangle
SaveDC
SelectClipPath
SelectPalette
SetAbortProc
SetBkColor
SetColorAdjustment
SetDIBColorTable
SetGraphicsMode
SetMapperFlags
SetRectRgn
SetStretchBltMode
SetTextColor
SetTextJustification
SetWindowExtEx
SetWindowOrgEx
SetWorldTransform
StartDocW
StretchBlt
StrokePath
TextOutA
TextOutW
TranslateCharsetInfo
UnrealizeObject
shell32
CommandLineToArgvW
DragFinish
DragQueryFile
DragQueryFileA
DragQueryFileW
DragQueryPoint
ExtractAssociatedIconW
ExtractIconA
ExtractIconExW
ExtractIconW
FindExecutableW
SHAppBarMessage
SHBindToParent
SHBrowseForFolderA
SHBrowseForFolderW
SHChangeNotify
SHCreateDirectoryExA
SHCreateDirectoryExW
SHFileOperationW
SHGetDesktopFolder
SHGetDiskFreeSpaceExW
SHGetFileInfoA
SHGetFileInfoW
SHGetFolderLocation
SHGetFolderPathA
SHGetFolderPathW
SHGetMalloc
SHGetPathFromIDList
SHGetPathFromIDListA
SHGetSpecialFolderPathW
ShellExecuteA
ShellExecuteEx
ShellExecuteExW
Shell_NotifyIconW
comctl32
CreatePropertySheetPageA
CreatePropertySheetPageW
DestroyPropertySheetPage
ImageList_AddMasked
ImageList_BeginDrag
ImageList_Destroy
ImageList_DragEnter
ImageList_DragLeave
ImageList_Draw
ImageList_GetIcon
ImageList_GetImageCount
ImageList_GetImageInfo
ImageList_LoadImageW
ImageList_Read
ImageList_Remove
ImageList_SetDragCursorImage
ImageList_SetIconSize
ImageList_SetOverlayImage
InitCommonControls
InitializeFlatSB
PropertySheetA
PropertySheetW
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE