Static task
static1
Behavioral task
behavioral1
Sample
45c1d65556e6d9d2b7de87451ab75e5aafcb55c9a253ea306801233945d2d917.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
45c1d65556e6d9d2b7de87451ab75e5aafcb55c9a253ea306801233945d2d917.exe
Resource
win10v2004-20220812-en
General
-
Target
45c1d65556e6d9d2b7de87451ab75e5aafcb55c9a253ea306801233945d2d917
-
Size
101KB
-
MD5
06b2b962a61160808ae816f284070e1d
-
SHA1
b17a742e0a444d589f6c0258e5185e9c75eec326
-
SHA256
45c1d65556e6d9d2b7de87451ab75e5aafcb55c9a253ea306801233945d2d917
-
SHA512
1d385542b76af547e536d5e432a6ba14069a1a5fe44ac0f0719498a19865a25f22934ae1d8408163b4e38a42441b289576d69e8ff492f45bf19c06ef6b5c0a64
-
SSDEEP
3072:9Fe06XEkVj1Y8ggcHBS9fF0sK6IOiUXqJOOg:9FeNE81YP3Hw9fFhXqJx
Malware Config
Signatures
Files
-
45c1d65556e6d9d2b7de87451ab75e5aafcb55c9a253ea306801233945d2d917.exe windows x86
1106afc81bb062610ae19d914635bce7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
msvcrt
__p___initenv
_initterm
_controlfp
__p__fmode
_adjust_fdiv
_except_handler3
__setusermatherr
__getmainargs
_exit
__set_app_type
_XcptFilter
__p__commode
kernel32
GetThreadLocale
DeleteFileA
GetUserDefaultLangID
GetShortPathNameA
GetCurrentProcessId
lstrlenA
GetConsoleOutputCP
GetEnvironmentStringsW
Sleep
GetSystemDirectoryW
GetLocalTime
GetModuleFileNameW
GetTempPathA
VirtualProtect
RemoveDirectoryA
lstrcpynA
GetExitCodeProcess
lstrcmpiA
GetCommandLineW
FreeEnvironmentStringsA
GlobalHandle
LocalFileTimeToFileTime
WideCharToMultiByte
LCMapStringW
GetACP
FileTimeToLocalFileTime
GetStringTypeW
GetCPInfo
GetModuleHandleW
SystemTimeToFileTime
GetVersionExW
VirtualFree
LoadResource
MulDiv
GetLocaleInfoA
MultiByteToWideChar
RaiseException
lstrcmpA
GetDateFormatA
GetModuleHandleA
IsDBCSLeadByte
ExitProcess
IsDebuggerPresent
advapi32
AddAccessAllowedAce
RegOpenKeyExW
GetSecurityDescriptorDacl
GetTokenInformation
InitializeAcl
OpenThreadToken
RegQueryInfoKeyA
GetUserNameA
RegQueryInfoKeyW
RegOpenKeyExA
CheckTokenMembership
AdjustTokenPrivileges
RegEnumKeyExA
RegDeleteValueW
RegCreateKeyExA
RegQueryValueExA
RegCreateKeyExW
RegEnumKeyA
RegOpenKeyA
AllocateAndInitializeSid
CryptAcquireContextA
DeregisterEventSource
RegSetValueExW
LookupPrivilegeValueA
ControlService
SetSecurityDescriptorGroup
RegSetValueExA
RevertToSelf
CryptGenRandom
OpenSCManagerW
SetSecurityDescriptorDacl
RegDeleteValueA
CryptHashData
RegFlushKey
CryptCreateHash
user32
EqualRect
SystemParametersInfoA
GetActiveWindow
RegisterClipboardFormatA
MessageBeep
GetWindow
OffsetRect
GetClassNameA
IsWindowEnabled
DestroyMenu
SetForegroundWindow
CallWindowProcA
MapWindowPoints
PtInRect
SetActiveWindow
MessageBoxA
SetWindowTextA
FillRect
SendDlgItemMessageA
SetWindowPlacement
DrawFrameControl
CallNextHookEx
GetDlgItem
SetScrollRange
UnhookWindowsHookEx
GetWindowRect
GetMenuItemID
WinHelpA
EnableWindow
LoadCursorA
DefWindowProcA
SetPropA
GetCapture
IsWindowVisible
IntersectRect
ShowWindow
CloseClipboard
GetScrollRange
DrawTextA
SetTimer
ReleaseCapture
CreateWindowExA
SetScrollInfo
EndPaint
GetSystemMetrics
SetCursor
RemoveMenu
GetSubMenu
GetParent
SendMessageA
Sections
.text Size: 1024B - Virtual size: 780B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ