Static task
static1
Behavioral task
behavioral1
Sample
19f330e532a5278d2019cce6d16086e90ad88b0443a6590e469615fbecfbd142.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
19f330e532a5278d2019cce6d16086e90ad88b0443a6590e469615fbecfbd142.exe
Resource
win10v2004-20220901-en
General
-
Target
19f330e532a5278d2019cce6d16086e90ad88b0443a6590e469615fbecfbd142
-
Size
82KB
-
MD5
1304fd7f89a262a092544585782d832a
-
SHA1
55bcdcae4df5b972f0fd6270886d5b7f64e9a810
-
SHA256
19f330e532a5278d2019cce6d16086e90ad88b0443a6590e469615fbecfbd142
-
SHA512
4826bd1390ac086516f454fff82829a9332c86b2090bb68da7a2ad37e37087e26e9f94fd133faf1cf38db9421424e2830155e2158da134a61c8c745b95df92e8
-
SSDEEP
1536:J0OFw/st2LtsBW9Hx6N/gbZapidA1zXZw2k7lae0i9cjaD5L7ZBe:J0OFw/O2LWBW9RbApid2zXZu51QstZBe
Malware Config
Signatures
Files
-
19f330e532a5278d2019cce6d16086e90ad88b0443a6590e469615fbecfbd142.exe windows x86
a74d5c02f90d702578c1f8ea255eda38
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
EnableMenuItem
GetSubMenu
EqualRect
UnhookWindowsHookEx
GetSysColorBrush
SetWindowTextA
FrameRect
PostQuitMessage
GetScrollPos
EnumWindows
SetWindowPos
GetSysColor
GetMessageA
kernel32
GetThreadLocale
GetCurrentProcessId
GetSystemTime
GetTickCount
SetUnhandledExceptionFilter
GetStartupInfoA
GetTimeZoneInformation
GetACP
ExitProcess
VirtualAllocEx
FileTimeToSystemTime
GetTempPathA
GetFileAttributesA
InterlockedExchange
RtlUnwind
gdi32
CopyEnhMetaFileA
SetViewportExtEx
CreateCompatibleBitmap
ExcludeClipRect
CreateICW
FillRgn
DPtoLP
SelectClipPath
GetMapMode
ole32
CoInitialize
StringFromGUID2
CoInitializeSecurity
StgOpenStorage
CoTaskMemRealloc
OleRun
CoCreateInstance
CoRevokeClassObject
DoDragDrop
advapi32
QueryServiceStatus
RegQueryValueExW
GetSecurityDescriptorDacl
FreeSid
RegCreateKeyA
CryptHashData
CheckTokenMembership
RegCreateKeyExW
GetUserNameA
AdjustTokenPrivileges
msvcrt
_strdup
signal
raise
_CIpow
fflush
__getmainargs
strncpy
fprintf
strcspn
_flsbuf
__setusermatherr
puts
iswspace
_mbscmp
strlen
_lock
_fdopen
__initenv
comctl32
ImageList_LoadImageA
ImageList_GetBkColor
ImageList_GetIconSize
ImageList_DrawEx
ImageList_LoadImageW
ImageList_GetIcon
InitCommonControls
ImageList_Write
ImageList_DragEnter
ImageList_ReplaceIcon
CreatePropertySheetPageA
ImageList_SetIconSize
ImageList_Destroy
shell32
SHGetPathFromIDList
ShellExecuteEx
ShellExecuteW
SHBrowseForFolderA
ExtractIconExW
DragQueryFileW
DragAcceptFiles
CommandLineToArgvW
DoEnvironmentSubstW
ExtractIconW
DragQueryFileA
oleaut32
SafeArrayCreate
SafeArrayRedim
SafeArrayGetUBound
SafeArrayPtrOfIndex
SafeArrayUnaccessData
SysReAllocStringLen
SafeArrayPutElement
VariantCopy
Sections
.text Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
lvgsjwj Size: - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
dsxapxf Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE