Static task
static1
Behavioral task
behavioral1
Sample
234fc4c492ef7d4e647c4f9ea68003e213b8a9891b24c4771a06374915030062.exe
Resource
win7-20220812-en
General
-
Target
234fc4c492ef7d4e647c4f9ea68003e213b8a9891b24c4771a06374915030062
-
Size
354KB
-
MD5
31ae70c07edeb1c3794b22d806641f70
-
SHA1
ac07aed878c9c264c1057bc05d725e8b57ea33ea
-
SHA256
234fc4c492ef7d4e647c4f9ea68003e213b8a9891b24c4771a06374915030062
-
SHA512
5f3749841644c9a71dc9d11fb924f1aeec97be1620ed02b2d1db71c910e17a73a050103c8aafba49d32e6c1035dd268cbeefa3cc04e6ee7be1e599c01d1af4e1
-
SSDEEP
6144:jU5npygCyAb5hbUtPR4N8m7eV+wGwCl6nzE9OkzDXU1CzIEm:jU5nBqDadqeVTGwCYwzHgCzIH
Malware Config
Signatures
Files
-
234fc4c492ef7d4e647c4f9ea68003e213b8a9891b24c4771a06374915030062.exe windows x86
744598c5d3266582aebdfea740a21972
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesExW
DeleteFileW
MoveFileW
WideCharToMultiByte
CreateFileW
SetFilePointer
WriteFile
CreateEventW
GetCommandLineW
LocalFree
OpenMutexW
GetTempPathW
GetVersionExA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
InterlockedCompareExchange
LoadLibraryA
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
lstrlenW
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetLocalTime
GetLastError
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeW
GetStringTypeA
GetLocaleInfoW
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCurrentProcessId
QueryPerformanceCounter
HeapCreate
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStdHandle
ExitProcess
GetModuleHandleA
RtlUnwind
CreateThread
ExitThread
GetSystemTimeAsFileTime
IsDebuggerPresent
SetUnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
GetConsoleCP
OutputDebugStringA
LoadLibraryW
GetModuleFileNameW
SetLastError
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
Sleep
GetModuleHandleW
GetProcAddress
FreeLibrary
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
RaiseException
WaitForSingleObject
UnhandledExceptionFilter
VirtualFreeEx
ReadProcessMemory
CloseHandle
VirtualAllocEx
OpenProcess
GetVersionExW
InterlockedIncrement
FindResourceExW
LoadResource
LockResource
SizeofResource
FindResourceW
InterlockedDecrement
GetTickCount
MulDiv
IsValidLocale
MultiByteToWideChar
user32
UnregisterClassA
GetPropW
GetDesktopWindow
SetPropW
DispatchMessageW
TranslateMessage
GetMessageW
BringWindowToTop
SetForegroundWindow
GetWindow
RedrawWindow
WindowFromPoint
PostQuitMessage
SetWindowTextW
CreateDialogParamW
GetClientRect
GetDlgItem
CopyRect
OffsetRect
DrawTextW
SystemParametersInfoW
GetWindowThreadProcessId
GetClassNameW
EnumChildWindows
FindWindowW
LoadImageW
LoadIconW
DestroyIcon
SetWindowRgn
SendMessageW
GetWindowRgn
DrawIconEx
GetMonitorInfoW
MonitorFromPoint
UpdateLayeredWindow
GetParent
TrackMouseEvent
GetDlgCtrlID
GetSystemMetrics
EndPaint
BeginPaint
MoveWindow
PostMessageW
DefWindowProcW
IsWindowVisible
SetWindowPos
GetWindowLongW
SetWindowLongW
UpdateWindow
ShowWindow
CreateWindowExW
RegisterClassExW
GetClassInfoExW
GetKeyState
UnregisterClassW
DestroyWindow
ScreenToClient
LoadCursorW
SetCursor
ReleaseCapture
GetCapture
KillTimer
GetWindowRect
GetCursorPos
SetTimer
InvalidateRect
IsWindow
PtInRect
SetRect
LoadBitmapW
ReleaseDC
GetDC
MapWindowPoints
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
shell32
SHGetSpecialFolderPathW
Shell_NotifyIconW
CommandLineToArgvW
SHCreateDirectoryExW
shlwapi
PathFileExistsW
gdi32
GetDeviceCaps
BitBlt
DeleteObject
SetBkMode
SetTextColor
Rectangle
DeleteDC
ExtCreateRegion
CombineRgn
CreateSolidBrush
CreateDIBSection
CreateCompatibleDC
GetObjectW
CreateFontIndirectW
PatBlt
SetBkColor
CreateRectRgn
PtInRegion
CreateFontW
SelectObject
ws2_32
htons
htonl
imm32
ImmDisableIME
Sections
.text Size: 156KB - Virtual size: 153KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 148KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE