Static task
static1
Behavioral task
behavioral1
Sample
c4b5908cdf1cd36b618c33c4d6e74edfc19778d78276f33e00a1b3adc80175ef.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c4b5908cdf1cd36b618c33c4d6e74edfc19778d78276f33e00a1b3adc80175ef.exe
Resource
win10v2004-20220812-en
General
-
Target
c4b5908cdf1cd36b618c33c4d6e74edfc19778d78276f33e00a1b3adc80175ef
-
Size
83KB
-
MD5
4426b7a24ce809c4481aa64ea7eaeb56
-
SHA1
45d3bc8b325cadfe00aa1097bcabcf481752ee95
-
SHA256
c4b5908cdf1cd36b618c33c4d6e74edfc19778d78276f33e00a1b3adc80175ef
-
SHA512
51f506f7a42e226769feaa5671063f3b0662a88e0353013a95258d4d1d5aabf19c368410f9ca0510013391d5cfffd526faa18229e58305a356c1f380c5777594
-
SSDEEP
1536:eC7LAYwIxCpr+DboAMigRSSUyMjS3GZvh7ijZxA+rTZtKoj68Alob5fcI:eCoYwhCOPwyM3AjZOsy8AlG5fc
Malware Config
Signatures
Files
-
c4b5908cdf1cd36b618c33c4d6e74edfc19778d78276f33e00a1b3adc80175ef.exe windows x86
c4ff6b57ffd9b0bf8e10e73f958287ff
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
EnableMenuItem
GetSubMenu
EqualRect
GetScrollPos
EnumWindows
GetMessageA
GetSysColorBrush
UnhookWindowsHookEx
SetWindowPos
FrameRect
GetSysColor
SetWindowTextA
PostQuitMessage
kernel32
RtlUnwind
GetOEMCP
GetCurrentProcessId
ExitProcess
VirtualAllocEx
GetStartupInfoA
GetTickCount
GetTimeZoneInformation
GetThreadLocale
SetUnhandledExceptionFilter
FileTimeToSystemTime
GetACP
GetTempPathA
GetFileAttributesA
InterlockedExchange
gdi32
DPtoLP
FillRgn
SetViewportExtEx
ExcludeClipRect
GetMapMode
CopyEnhMetaFileA
SelectClipPath
CreateCompatibleBitmap
CreateICW
ole32
CoTaskMemRealloc
StgOpenStorage
OleRun
CoCreateInstance
CoInitialize
CoRevokeClassObject
StringFromGUID2
DoDragDrop
CoInitializeSecurity
advapi32
CheckTokenMembership
GetUserNameA
CryptHashData
RegCreateKeyA
AdjustTokenPrivileges
RegQueryValueExW
QueryServiceStatus
GetSecurityDescriptorDacl
FreeSid
RegCreateKeyExW
msvcrt
strncpy
_strdup
_flsbuf
strlen
_fdopen
puts
raise
__getmainargs
_lock
iswspace
_mbscmp
__initenv
signal
fprintf
strcspn
_CIpow
__setusermatherr
fflush
comctl32
ImageList_DragEnter
ImageList_SetIconSize
ImageList_Write
ImageList_DrawEx
ImageList_LoadImageW
ImageList_GetBkColor
ImageList_LoadImageA
CreatePropertySheetPageA
InitCommonControls
ImageList_GetIcon
ImageList_Destroy
ImageList_GetIconSize
ImageList_ReplaceIcon
shell32
DragQueryFileA
DragQueryFileW
CommandLineToArgvW
DragAcceptFiles
ShellExecuteW
ExtractIconW
ExtractIconExW
DoEnvironmentSubstW
SHGetPathFromIDList
SHBrowseForFolderA
ShellExecuteEx
oleaut32
SafeArrayUnaccessData
SafeArrayPtrOfIndex
SafeArrayGetUBound
VariantCopy
SafeArrayPutElement
SysReAllocStringLen
SafeArrayCreate
SafeArrayRedim
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ggetqkf Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE