Static task
static1
Behavioral task
behavioral1
Sample
423c07285f519354fe0ca3f372ddd37f63c4218d69437d5ed02ed9fca4e0bdb0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
423c07285f519354fe0ca3f372ddd37f63c4218d69437d5ed02ed9fca4e0bdb0.exe
Resource
win10v2004-20220812-en
General
-
Target
423c07285f519354fe0ca3f372ddd37f63c4218d69437d5ed02ed9fca4e0bdb0
-
Size
669KB
-
MD5
00bbf3e3f154f559ec7fbcd49368af85
-
SHA1
cba66facb9a4e1669a7cba00ae0bc15219bceba9
-
SHA256
423c07285f519354fe0ca3f372ddd37f63c4218d69437d5ed02ed9fca4e0bdb0
-
SHA512
98d87f344e61b021e3d7225600eb6cbeb3b1ff56a344d3ed8beb6fb8dc0e0367aeb669e5d55787acbc02adb09b205f42be5453c556e7e1d0869ff52c88dd156f
-
SSDEEP
12288:OtLdSR+H9n11h5CGaely79rFzv4efJC9YAus5iUUO69NrP5UXDcQ:Oxd+29n7Laely7BFzvpfJ7Au3U3INT5U
Malware Config
Signatures
Files
-
423c07285f519354fe0ca3f372ddd37f63c4218d69437d5ed02ed9fca4e0bdb0.exe windows x86
5d1fd78a5d19555d974d33830473c1f5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegQueryValueExA
OpenServiceA
CloseServiceHandle
RegCloseKey
RegConnectRegistryA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
user32
OpenClipboard
GetClassNameA
DestroyWindow
LoadIconA
KillTimer
DefWindowProcA
CharUpperA
GetDC
LoadMenuA
GetActiveWindow
GetDlgCtrlID
IsWindowVisible
GetAsyncKeyState
GetMenuItemInfoA
GetClipboardFormatNameA
GetMenuItemCount
PostQuitMessage
CallWindowProcA
DestroyIcon
RegisterClassExA
DispatchMessageA
GetKeyState
GetMenuState
DrawIcon
GetCursorPos
SendMessageA
MessageBoxA
SetCursor
GetFocus
LoadCursorA
GetWindowRect
RegisterClassA
GetDlgItemTextA
IsChild
ShowWindow
LoadStringA
UnregisterClassA
IntersectRect
ExcludeUpdateRgn
PostThreadMessageA
SetCaretPos
LoadImageA
PeekMessageA
GetDlgItem
CreateWindowExA
ReleaseDC
LoadAcceleratorsA
TranslateAcceleratorA
GetClientRect
IsMenu
GetDCEx
UpdateWindow
AdjustWindowRectEx
IsWindow
RedrawWindow
comctl32
InitCommonControlsEx
ImageList_GetImageInfo
oleaut32
LoadTypeLi
shlwapi
PathAppendA
PathFindExtensionA
PathStripToRootA
PathRemoveFileSpecA
PathIsDirectoryA
PathUnquoteSpacesA
PathQuoteSpacesA
shell32
SHGetPathFromIDListA
DragAcceptFiles
DragQueryFileA
SHChangeNotify
SHGetMalloc
DragFinish
ShellExecuteA
ShellExecuteExA
SHFileOperationA
ord155
SHGetSpecialFolderPathA
kernel32
GlobalHandle
RtlUnwind
OutputDebugStringA
SetThreadPriority
LCMapStringW
CreateThread
FindNextFileW
TerminateProcess
DeviceIoControl
GetModuleHandleW
CreateDirectoryA
GetVersionExW
GetStringTypeA
FreeEnvironmentStringsA
IsValidCodePage
ResumeThread
GetSystemInfo
FindFirstFileW
GetSystemDirectoryA
lstrlenW
InterlockedIncrement
HeapCreate
SetHandleCount
GetFileType
UnhandledExceptionFilter
lstrcmpiA
GetTempPathW
lstrcpyW
InterlockedDecrement
FormatMessageW
GetModuleFileNameA
GetStringTypeW
VirtualAlloc
GetFileSize
GetStartupInfoA
SetEnvironmentVariableA
GlobalSize
GetModuleHandleA
CreateEventW
FreeEnvironmentStringsW
GetFileAttributesA
LeaveCriticalSection
IsBadCodePtr
GetLocaleInfoW
FlushFileBuffers
VirtualQuery
LocalAlloc
FreeLibrary
GlobalFlags
GetEnvironmentStringsW
WaitForSingleObject
DuplicateHandle
FindFirstFileA
TlsFree
lstrcmpA
UnmapViewOfFile
DeleteFileW
SetStdHandle
GetModuleFileNameW
ResetEvent
SuspendThread
CopyFileW
GetTimeZoneInformation
CreateFileA
CreateDirectoryW
ReleaseMutex
WriteFile
DeleteCriticalSection
CreateFileW
GetThreadLocale
InterlockedExchange
GetFileTime
CompareStringA
CreateMutexW
SizeofResource
CopyFileA
MultiByteToWideChar
Sleep
IsBadReadPtr
GetCurrentProcessId
HeapDestroy
TlsAlloc
VirtualProtect
GlobalUnlock
GlobalFree
ReadFile
GetCurrentThread
FreeResource
UnlockFile
GetShortPathNameW
LoadResource
SetLastError
GetEnvironmentStrings
GetCurrentDirectoryA
FileTimeToLocalFileTime
HeapReAlloc
GlobalReAlloc
LoadLibraryW
GetUserDefaultLCID
GetCurrentThreadId
HeapAlloc
IsBadWritePtr
MoveFileW
GetACP
GetCommandLineW
SetFileAttributesW
HeapSize
LocalFree
GetDateFormatA
GetOEMCP
GetTimeFormatA
EnterCriticalSection
GetFileAttributesW
GlobalAlloc
GetStartupInfoW
GetLastError
GetVersion
LoadLibraryA
MulDiv
GetSystemTimeAsFileTime
GetLocalTime
CreateMutexA
SetFilePointer
GetStdHandle
lstrcmpiW
LCMapStringA
CompareStringW
FindClose
GetCurrentProcess
HeapFree
TlsGetValue
SetUnhandledExceptionFilter
TlsSetValue
FindNextFileA
GetTempFileNameW
RaiseException
GetTempPathA
WriteConsoleA
CloseHandle
LocalReAlloc
GetUserDefaultLangID
MapViewOfFile
WideCharToMultiByte
QueryPerformanceCounter
LockResource
GetProcessHeap
lstrcmpW
SystemTimeToFileTime
SetEndOfFile
lstrlenA
GetLocaleInfoA
GetTickCount
ExpandEnvironmentStringsW
GetCurrentDirectoryW
GetSystemDirectoryW
ExitProcess
GlobalDeleteAtom
lstrcpyA
SetEvent
LockFile
IsDebuggerPresent
VirtualFree
ExitThread
InitializeCriticalSection
SetFileTime
ConvertDefaultLocale
lstrcpynW
GetProcAddress
GetFullPathNameW
GetCommandLineA
FileTimeToSystemTime
GetVersionExA
GlobalLock
SetErrorMode
SetEnvironmentVariableW
LocalFileTimeToFileTime
GetCPInfo
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 463KB - Virtual size: 462KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ