Static task
static1
Behavioral task
behavioral1
Sample
419f27f81db003502725cb47ff6302c5ec203c883af7413e8b6c6da7182ca6d3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
419f27f81db003502725cb47ff6302c5ec203c883af7413e8b6c6da7182ca6d3.exe
Resource
win10v2004-20221111-en
General
-
Target
419f27f81db003502725cb47ff6302c5ec203c883af7413e8b6c6da7182ca6d3
-
Size
248KB
-
MD5
37556e7c8bee248eb912525c0edb0930
-
SHA1
03a6f08ba45bfd25091a304b8a61094e6ca0fdac
-
SHA256
419f27f81db003502725cb47ff6302c5ec203c883af7413e8b6c6da7182ca6d3
-
SHA512
114dd7d7f7dcf8684569c481c63a87ec27a593371a1ca4506ff1c0603f6bb23118718b8c6e67f870f9d17c86979561d8d1ab33214c0b2c5ade9c01076039507b
-
SSDEEP
6144:d7jM99pmINAACArZcpa0llDasS4Q+/u4iY7m+k4Sfgi:JMbvsZLDaV107jtSfH
Malware Config
Signatures
Files
-
419f27f81db003502725cb47ff6302c5ec203c883af7413e8b6c6da7182ca6d3.exe windows x86
7074a42a4c94e249b65b4812a939381b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceExW
GetTimeZoneInformation
WritePrivateProfileSectionA
RaiseException
GetNumberFormatW
ReadFile
GetCommModemStatus
LoadResource
WaitNamedPipeA
ScrollConsoleScreenBufferA
GetTapeParameters
UnmapViewOfFile
GlobalFlags
_lread
CreateProcessA
GetCPInfo
GetUserDefaultLCID
Beep
EraseTape
IsBadStringPtrA
GetSystemTimeAsFileTime
GetVersionExA
GetStartupInfoA
FindFirstFileW
SetLastError
LCMapStringA
ExitProcess
VirtualProtect
IsDBCSLeadByteEx
VirtualQuery
SetThreadAffinityMask
_lclose
SetCommTimeouts
GetOEMCP
IsValidLocale
CreateDirectoryA
FindResourceExA
GetDriveTypeW
GlobalAddAtomA
PurgeComm
ClearCommBreak
InitializeCriticalSection
GetPrivateProfileStringW
CreateNamedPipeW
GetCommandLineA
lstrlenA
VirtualAlloc
ReadConsoleA
user32
UnhookWinEvent
CharToOemBuffA
TileWindows
GetCapture
UnregisterClassA
RegisterDeviceNotificationA
GetProcessDefaultLayout
GetNextDlgGroupItem
GetKeyState
EnumWindows
DefFrameProcW
LoadBitmapA
BroadcastSystemMessageA
CreateDialogIndirectParamA
GetPropA
WindowFromPoint
RegisterClassW
EnumWindowStationsA
DefDlgProcA
SwitchToThisWindow
IsCharAlphaA
gdi32
SetWindowOrgEx
OffsetWindowOrgEx
SetBitmapDimensionEx
SetPixel
CreateFontW
GetROP2
GetPixel
SaveDC
SetMetaFileBitsEx
CreateICA
SetLayout
GetTextCharsetInfo
comdlg32
PageSetupDlgA
ReplaceTextW
CommDlgExtendedError
advapi32
GetAce
GetSidIdentifierAuthority
LookupPrivilegeDisplayNameA
ObjectDeleteAuditAlarmW
CryptVerifySignatureA
CreateProcessAsUserW
RegSaveKeyA
SetNamedSecurityInfoW
RegSetValueW
RegUnLoadKeyW
GetServiceDisplayNameA
SetNamedSecurityInfoA
RegisterServiceCtrlHandlerW
AbortSystemShutdownW
GetTokenInformation
GetNamedSecurityInfoW
CryptReleaseContext
LookupPrivilegeValueA
EqualSid
AbortSystemShutdownA
LogonUserA
ObjectCloseAuditAlarmW
GetSidLengthRequired
RegEnumKeyW
CryptDeriveKey
GetFileSecurityW
LookupPrivilegeNameA
StartServiceW
RegisterEventSourceA
RegReplaceKeyW
CloseEventLog
SetKernelObjectSecurity
RegQueryValueW
OpenThreadToken
RegEnumKeyA
CryptGenRandom
InitiateSystemShutdownW
DestroyPrivateObjectSecurity
shell32
ExtractIconExW
Shell_NotifyIconW
SHFileOperationA
SHBrowseForFolderA
ole32
CoReleaseServerProcess
OleQueryLinkFromData
OleSetClipboard
OleFlushClipboard
PropVariantCopy
MkParseDisplayName
CreateBindCtx
oleaut32
LoadTypeLi
SafeArrayPutElement
shlwapi
PathCanonicalizeW
StrCmpNW
SHAutoComplete
PathRemoveExtensionW
StrCmpNA
ChrCmpIW
AssocCreate
StrChrIW
SHDeleteKeyA
StrDupW
StrPBrkW
PathGetArgsW
PathUnquoteSpacesW
PathUnquoteSpacesA
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 232KB - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE