Static task
static1
Behavioral task
behavioral1
Sample
43c651224b0405065c1097282a0c345e7666faa9a6fe2fc705b6adff4b492119.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
43c651224b0405065c1097282a0c345e7666faa9a6fe2fc705b6adff4b492119.exe
Resource
win10v2004-20221111-en
General
-
Target
43c651224b0405065c1097282a0c345e7666faa9a6fe2fc705b6adff4b492119
-
Size
476KB
-
MD5
09fcf12a4899d66b3a7084e5b1fec7b1
-
SHA1
2577d75efffb85c545152985d7be0c0d736a9215
-
SHA256
43c651224b0405065c1097282a0c345e7666faa9a6fe2fc705b6adff4b492119
-
SHA512
90a3f6676d91cd918fabc336c2676bfe5f6bd5f3cc64d0a7c21d584708b8db853d0a49bc09f733cbe7b15dcef62938642280249af586a70a60436a7512677b86
-
SSDEEP
12288:cXV5K2/QfFVbPfv9ea+18IKjR5E76xZOry6nz:Aq2/Qz3s2DxZOOyz
Malware Config
Signatures
Files
-
43c651224b0405065c1097282a0c345e7666faa9a6fe2fc705b6adff4b492119.exe windows x86
dbc12d533086f776d0d1efe26e7ca8d1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetDesktopFolder
SHGetMalloc
ShellExecuteW
SHBrowseForFolderA
ord155
kernel32
GetCurrentProcessId
RaiseException
TlsGetValue
SetUnhandledExceptionFilter
VirtualAlloc
GetFileTime
IsValidCodePage
GetCurrentThread
ReadFile
MultiByteToWideChar
InitializeCriticalSection
CreateFileA
IsBadWritePtr
GetEnvironmentStrings
TlsSetValue
SetEnvironmentVariableA
SetFileTime
TlsFree
FileTimeToSystemTime
FreeEnvironmentStringsW
GetCurrentProcess
SetStdHandle
CreateMutexW
LockResource
SetFilePointer
HeapDestroy
InterlockedExchange
VirtualFree
LeaveCriticalSection
FindFirstFileW
GetSystemTimeAsFileTime
HeapFree
SetHandleCount
GetTimeFormatA
QueryPerformanceCounter
GetCPInfo
GetStartupInfoW
UnmapViewOfFile
FlushFileBuffers
GetModuleHandleA
RtlUnwind
GetThreadLocale
SetLastError
Sleep
GetFullPathNameW
HeapAlloc
GetStringTypeW
EnterCriticalSection
CloseHandle
GetStartupInfoA
GetModuleHandleW
LocalFree
GetCurrentDirectoryA
IsBadReadPtr
HeapReAlloc
ExitProcess
GetVersion
HeapSize
GetTimeZoneInformation
GetModuleFileNameW
DeleteCriticalSection
WriteFile
FatalAppExitA
LoadLibraryA
GlobalDeleteAtom
HeapCreate
FindClose
GetDateFormatA
LCMapStringA
GetCurrentThreadId
GlobalSize
GetLastError
GlobalUnlock
GetSystemTime
TlsAlloc
GetLocaleInfoW
GetEnvironmentStringsW
GlobalLock
WideCharToMultiByte
SetConsoleCtrlHandler
GetCommandLineA
LCMapStringW
GetProcessHeap
IsBadCodePtr
InterlockedDecrement
FreeLibrary
FindFirstFileA
GetFileType
SizeofResource
GetModuleFileNameA
CompareStringA
GetProcAddress
TerminateProcess
GetTickCount
CreateProcessA
InterlockedIncrement
GlobalAlloc
GetStdHandle
GetVersionExA
GetFileSize
UnhandledExceptionFilter
GetCommandLineW
VirtualQuery
FreeEnvironmentStringsA
GlobalFree
GetUserDefaultLCID
lstrlenW
CompareStringW
GetLocalTime
GetStringTypeA
SetErrorMode
winspool.drv
OpenPrinterA
ord204
DocumentPropertiesA
user32
SetClipboardData
GetDlgCtrlID
GetClientRect
MessageBoxW
CallWindowProcW
SetActiveWindow
GetActiveWindow
DefWindowProcW
LoadBitmapW
IsZoomed
UnpackDDElParam
IsDialogMessageW
GetWindowPlacement
GetSystemMenu
ReleaseCapture
SendDlgItemMessageA
GetTopWindow
WindowFromPoint
TranslateMessage
GetWindowThreadProcessId
IsWindowVisible
CreateWindowExW
InsertMenuItemW
OffsetRect
DestroyWindow
InvalidateRect
RegisterClassExW
SetTimer
GetSubMenu
CheckMenuItem
GetKeyboardLayout
SetWindowPlacement
SetFocus
CreatePopupMenu
UpdateWindow
SendMessageW
RegisterClassW
GetWindowRect
DestroyMenu
GetSysColorBrush
IsMenu
SetWindowTextW
EmptyClipboard
GetDesktopWindow
GetDC
GetCursorPos
OpenClipboard
LoadCursorW
IsChild
IsIconic
MoveWindow
GetWindow
GetSysColor
DrawIcon
PtInRect
GetUpdateRect
GetDoubleClickTime
CopyRect
ShowWindow
InflateRect
gdi32
CreateRectRgnIndirect
SetAbortProc
Escape
DeleteObject
GetBkColor
MoveToEx
SetTextColor
SetViewportOrgEx
GetTextExtentPoint32W
GetStockObject
EqualRgn
GdiFlush
SetBkColor
SetPolyFillMode
EndPage
RectVisible
RestoreDC
GetObjectW
StrokePath
SetViewportExtEx
SelectClipRgn
GetTextColor
GetBkMode
GetRgnBox
CreateDIBSection
CreatePalette
SetMapMode
SetPixel
GetMapMode
SetBkMode
DeleteDC
ScaleWindowExtEx
SelectObject
StretchDIBits
CreatePatternBrush
RectInRegion
Rectangle
SaveDC
SetTextAlign
CreateBitmap
EndDoc
ExtTextOutW
SetStretchBltMode
GetTextMetricsA
StretchBlt
OffsetViewportOrgEx
CreatePen
CreateSolidBrush
OffsetRgn
PtInRegion
CombineRgn
CreateDCW
PtVisible
IntersectClipRect
CreateFontIndirectW
BitBlt
SetWindowExtEx
GetDeviceCaps
CreatePolygonRgn
SetROP2
SetWindowOrgEx
GetPixel
ScaleViewportExtEx
ExcludeClipRect
CreateRectRgn
GetDIBits
Polygon
LineTo
ExtSelectClipRgn
SetBrushOrgEx
RealizePalette
CreateCompatibleBitmap
TextOutW
SelectPalette
Polyline
Ellipse
GetWindowExtEx
CreateCompatibleDC
GetClipBox
Arc
AbortDoc
ExtCreatePen
StartPage
comctl32
InitCommonControlsEx
ImageList_AddMasked
ImageList_GetImageCount
ord17
CreatePropertySheetPageA
advapi32
CryptHashData
RegDeleteValueA
RegQueryInfoKeyA
CryptCreateHash
RegEnumValueA
RegQueryValueExA
RegFlushKey
CryptDestroyHash
comdlg32
GetFileTitleW
GetOpenFileNameW
ole32
CreateStreamOnHGlobal
ReleaseStgMedium
OleFlushClipboard
CreateFileMoniker
StgIsStorageILockBytes
CreateGenericComposite
CoDisconnectObject
GetRunningObjectTable
CoLockObjectExternal
GetClassFile
WriteClassStg
OleDuplicateData
StringFromGUID2
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256KB - Virtual size: 254KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 64KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ