Static task
static1
Behavioral task
behavioral1
Sample
a1080f0f95cdf05e8bf231c7962f6b6703f2a3fae1069cd0c276a2a36261ce34.exe
Resource
win7-20220812-en
General
-
Target
a1080f0f95cdf05e8bf231c7962f6b6703f2a3fae1069cd0c276a2a36261ce34
-
Size
188KB
-
MD5
02de34e16838efc9fc4c6606877499eb
-
SHA1
1202b3b242d61616ab23cab58acb39234750d821
-
SHA256
a1080f0f95cdf05e8bf231c7962f6b6703f2a3fae1069cd0c276a2a36261ce34
-
SHA512
a95ac889ee60564c6bd7367231610f763e6271cabe1d83d84b32f6cd121c0a1741c4ca617d29e193e1346bd8c5a9c6e0c08f5e9bfde8167b36195c37d9136461
-
SSDEEP
3072:iE0QjAzXSjqPzBYNILDsi1C2a/7MCgQDsgBewLnVCju20v7etXmWuOVdhVsdMo3i:106AzXSjqBVtVUMo3V6K3XzSEBKdz
Malware Config
Signatures
Files
-
a1080f0f95cdf05e8bf231c7962f6b6703f2a3fae1069cd0c276a2a36261ce34.exe windows x86
073439831b7d73ccfbf712377003af81
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDirectoryW
FreeLibrary
OpenProcess
HeapAlloc
GetProcessHeap
HeapFree
GetProcAddress
RemoveDirectoryW
FindClose
FindNextFileW
FindFirstFileW
GetWindowsDirectoryW
GetTempPathW
CompareStringW
SetCurrentDirectoryW
LoadLibraryW
CreateProcessW
lstrlenA
GetEnvironmentVariableW
SearchPathW
GetStartupInfoA
GetModuleHandleA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
LoadLibraryA
GetCommandLineW
LocalAlloc
lstrcmpA
GetTickCount
CreateDirectoryW
CloseHandle
GetTempFileNameW
LocalFree
GetVersionExA
SetErrorMode
GetFileAttributesW
DeleteFileW
GetModuleFileNameW
GlobalFree
FindResourceW
LoadResource
SizeofResource
GlobalAlloc
GetLocaleInfoW
GetVersionExW
GetSystemDefaultLangID
IsDBCSLeadByte
MultiByteToWideChar
lstrlenW
WriteFile
ReadFile
SetFileAttributesW
CreateFileW
GetFileSize
ExpandEnvironmentStringsW
SetFilePointer
user32
DialogBoxIndirectParamW
LoadStringW
GetDC
ReleaseDC
GetKeyboardLayout
SystemParametersInfoW
EnumChildWindows
EndDialog
GetDlgItemTextW
SetDlgItemTextW
MessageBeep
SetWindowLongW
SetWindowTextW
ScreenToClient
GetClassNameW
CreateWindowExW
LoadBitmapW
GetWindowRect
DialogBoxParamW
GetClientRect
SetWindowPos
CharNextW
GetParent
PostMessageW
BeginPaint
GetWindowTextW
IsWindowEnabled
DrawTextW
EndPaint
CallWindowProcW
GetDlgItem
SendMessageW
EnableWindow
ShowWindow
InvalidateRect
CreateDialogIndirectParamW
IsWindowVisible
CharPrevW
MessageBoxA
EnableMenuItem
CharUpperA
CharUpperW
MessageBoxW
CharNextA
LoadCursorW
SetCursor
PeekMessageW
IsDialogMessageW
TranslateMessage
DispatchMessageW
LoadIconW
GetSystemMetrics
LoadImageW
CreateDialogParamW
ClientToScreen
MoveWindow
GetWindowTextLengthA
MapWindowPoints
UpdateWindow
IsDlgButtonChecked
SendDlgItemMessageW
GetSysColor
SetFocus
DestroyWindow
GetWindowLongW
SetParent
GetDesktopWindow
gdi32
GetDeviceCaps
CreateFontIndirectW
GetTextExtentPoint32W
SetBkMode
SetTextColor
CreateSolidBrush
Rectangle
GetObjectW
CreateCompatibleDC
SelectObject
SetStretchBltMode
StretchBlt
DeleteDC
EnumFontFamiliesExW
DeleteObject
comdlg32
CommDlgExtendedError
GetSaveFileNameW
GetOpenFileNameW
comctl32
ImageList_Destroy
advapi32
RegOpenKeyExA
RegDeleteKeyW
RegDeleteValueW
RegQueryInfoKeyW
RegEnumKeyExW
RegEnumValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegQueryValueExA
shell32
SHGetPathFromIDListW
SHGetMalloc
SHGetSpecialFolderLocation
msvcrt
_onexit
__dllonexit
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
wcschr
_wfullpath
memmove
_vsnwprintf
_controlfp
Sections
.text Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.zdata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE