Static task
static1
Behavioral task
behavioral1
Sample
ba30b7c4d83903b3b11aaaf8119eb3e5f523c9730420981381db1b9f5e618eea.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ba30b7c4d83903b3b11aaaf8119eb3e5f523c9730420981381db1b9f5e618eea.exe
Resource
win10v2004-20220812-en
General
-
Target
ba30b7c4d83903b3b11aaaf8119eb3e5f523c9730420981381db1b9f5e618eea
-
Size
233KB
-
MD5
42ca7e1b273eeabcd6166a06a83fbd60
-
SHA1
59cd7e45339158d994fd6a7ac37b28c6e4ddf452
-
SHA256
ba30b7c4d83903b3b11aaaf8119eb3e5f523c9730420981381db1b9f5e618eea
-
SHA512
1d550bec8fff068e308b9d63d73f4f9cdc0da2f2353abc0dfd6c0576bc970bbcdfefbcf12e53e58a6aa23716867f5d3ca36af38b573871260f11441c61ec5082
-
SSDEEP
6144:3yLwCwV8w3y/i/PBrE8PsDfxc9skZerJTuN:3ypOtBrE8Yf5kw
Malware Config
Signatures
Files
-
ba30b7c4d83903b3b11aaaf8119eb3e5f523c9730420981381db1b9f5e618eea.exe windows x86
ab2b32c066939c8f17b342f6519faa5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentDirectoryA
HeapFree
HeapAlloc
RtlUnwind
GetSystemTimeAsFileTime
GetDriveTypeA
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetStartupInfoA
VirtualAlloc
HeapReAlloc
HeapSize
HeapCreate
VirtualFree
GetStdHandle
FileTimeToLocalFileTime
GetFileType
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetACP
IsValidCodePage
GetTimeZoneInformation
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
GetOEMCP
GetCPInfo
GetLocaleInfoA
GlobalFlags
CreateFileA
GetFullPathNameA
FindFirstFileA
FindClose
GetCurrentProcess
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
lstrcmpW
GetVersionExA
FileTimeToSystemTime
lstrcmpA
GlobalGetAtomNameA
InterlockedIncrement
GetModuleHandleW
CompareStringA
GetCurrentThreadId
FormatMessageA
MultiByteToWideChar
lstrlenA
GetCurrentProcessId
FreeLibrary
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
InterlockedDecrement
GetModuleHandleA
GetProcAddress
TlsFree
GlobalFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalAlloc
GlobalHandle
GlobalUnlock
GlobalReAlloc
GlobalLock
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalFree
LocalAlloc
GetLastError
SetLastError
CreateToolhelp32Snapshot
Process32First
OpenProcess
TerminateProcess
CloseHandle
Process32Next
GetCommandLineA
SetFileAttributesA
CopyFileA
CreateDirectoryA
GetEnvironmentVariableA
GetTempPathA
GetTickCount
Sleep
CreateProcessA
SetHandleCount
GetModuleFileNameA
user32
LoadIconA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
GetClientRect
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
GetMenu
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetWindowTextA
LoadCursorA
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
GetKeyState
PeekMessageA
ValidateRect
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetWindowThreadProcessId
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
UnhookWindowsHookEx
MessageBoxA
SetWindowLongA
PostQuitMessage
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
ClientToScreen
SetWindowTextA
CallWindowProcA
RegisterWindowMessageA
SetPropA
gdi32
RestoreDC
SetMapMode
PtVisible
RectVisible
TextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
SaveDC
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
ExtTextOutA
DeleteObject
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
ScaleViewportExtEx
GetDeviceCaps
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegOpenKeyA
RegSetValueExA
RegCloseKey
oleaut32
VariantClear
VariantChangeType
VariantInit
ws2_32
closesocket
WSAStartup
socket
WSACleanup
gethostbyname
inet_ntoa
inet_addr
htons
connect
send
recv
oleacc
CreateStdAccessibleObject
LresultFromObject
Sections
.text Size: 190KB - Virtual size: 190KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE