Static task
static1
Behavioral task
behavioral1
Sample
447376c364bf4a5c94fc0bf8809ee0be82153a6665180d8b3c268d0418281917.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
447376c364bf4a5c94fc0bf8809ee0be82153a6665180d8b3c268d0418281917.exe
Resource
win10v2004-20220901-en
General
-
Target
447376c364bf4a5c94fc0bf8809ee0be82153a6665180d8b3c268d0418281917
-
Size
528KB
-
MD5
064ce500261302695810cae96d433240
-
SHA1
dddad54b17654c19b08deef858028876c757d0c4
-
SHA256
447376c364bf4a5c94fc0bf8809ee0be82153a6665180d8b3c268d0418281917
-
SHA512
7c6afbab4cdca5c1082ddb1ba1cc94734af7668b1e9885bdb8c36ae12c90040da7ec8db39809e22b3bb0a3bfa7d82604ef6c962f54285f87e5330241e50af167
-
SSDEEP
6144:tFquomTiUFgoP00PnoGhgdby+ljYqUkPUPjRSO7V6/H3K1dTGoKIRTFPGvqPeaXJ:P9mUFw0jhyy6H+F6/XWdTGSTRMxCEaf
Malware Config
Signatures
Files
-
447376c364bf4a5c94fc0bf8809ee0be82153a6665180d8b3c268d0418281917.exe windows x86
f4da2797acbd0661a311fc32ecd377f7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
UpdateWindow
ShowWindow
PostQuitMessage
EndPaint
BeginPaint
DefWindowProcW
SendMessageW
LoadIconW
LoadCursorW
DispatchMessageW
TranslateMessage
GetMessageW
CreateWindowExW
RegisterClassExW
DestroyWindow
GetDC
SetFocus
EnableWindow
EndDialog
RealChildWindowFromPoint
SetForegroundWindow
PeekMessageW
GetMonitorInfoW
DestroyMenu
DeleteMenu
SetWindowPlacement
IsZoomed
MonitorFromWindow
LoadStringW
GetMenuState
DialogBoxParamW
PostMessageW
DrawEdge
LoadImageW
GetDlgItem
DrawIconEx
TranslateAcceleratorW
LoadAcceleratorsW
GetMenuItemCount
IsIconic
DrawMenuBar
wsprintfW
CheckMenuRadioItem
EmptyClipboard
SetClipboardData
GetMenuStringW
kernel32
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetLocaleInfoA
MultiByteToWideChar
HeapSize
RtlUnwind
HeapReAlloc
VirtualAlloc
Sleep
GetOEMCP
GetACP
GetCPInfo
InitializeCriticalSection
LoadLibraryA
IsDebuggerPresent
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
HeapDestroy
InterlockedDecrement
GetCurrentThreadId
SetLastError
FindFirstFileW
FindNextFileW
FindClose
GetModuleHandleW
ExitProcess
InterlockedIncrement
TlsFree
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
GetProcAddress
GetModuleHandleA
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
comctl32
InitCommonControlsEx
shell32
CommandLineToArgvW
Sections
.text Size: 423KB - Virtual size: 422KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 35KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ