Static task
static1
Behavioral task
behavioral1
Sample
69650102506fa92570d2e33f3f5eafce4d5f1a962fbdb6e784c933bacafc3885.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
69650102506fa92570d2e33f3f5eafce4d5f1a962fbdb6e784c933bacafc3885.exe
Resource
win10v2004-20221111-en
General
-
Target
69650102506fa92570d2e33f3f5eafce4d5f1a962fbdb6e784c933bacafc3885
-
Size
168KB
-
MD5
451af7bfb05f2c0c7b3ff7df3b0335f0
-
SHA1
d2f485c765beaa1e111dc6f1bf894a413db688ac
-
SHA256
69650102506fa92570d2e33f3f5eafce4d5f1a962fbdb6e784c933bacafc3885
-
SHA512
e70b7cde888a3bd3da5afc602dad3a7b66a408344938efe08a2534e53b2b69fd45141ee3c9c45718cffc50f92df5f0a6f16c3d462f02731591b0cdb0d3171fbe
-
SSDEEP
3072:LRyCgct2D7RAefW/zNO/J6YL/q0zrn2izbdAkVf8Xe:LgdDlNrJnL/1/nXdAmfZ
Malware Config
Signatures
Files
-
69650102506fa92570d2e33f3f5eafce4d5f1a962fbdb6e784c933bacafc3885.exe windows x86
fa9d9ee45d86bbf937716af2021ff057
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FileTimeToDosDateTime
FlushFileBuffers
SetSystemTime
WaitForSingleObjectEx
lstrcpynW
SizeofResource
GetCommMask
QueueUserWorkItem
FindVolumeMountPointClose
IsSystemResumeAutomatic
DuplicateHandle
CallNamedPipeW
GlobalHandle
WriteFile
GetLogicalDrives
GetStringTypeW
FindFirstVolumeW
LocalFree
GetLogicalDriveStringsW
SetHandleCount
GetProcessHeap
FatalAppExitW
GetPrivateProfileSectionW
OutputDebugStringW
lstrcatW
CreateDirectoryA
GetExitCodeProcess
SetDefaultCommConfigW
MoveFileA
CreateSemaphoreW
lstrcpyA
GlobalMemoryStatusEx
SetLocaleInfoA
GetAtomNameW
ReadFileScatter
GetCompressedFileSizeA
Sleep
SetThreadIdealProcessor
CancelDeviceWakeupRequest
GetSystemDefaultLCID
secur32
LsaFreeReturnBuffer
user32
DefWindowProcW
GetWindow
SendDlgItemMessageW
GetDlgItem
GetFocus
InvalidateRect
GetParent
GetWindowRect
SetCursor
SetClassWord
GetPropW
SetWindowPos
ReleaseDC
RegisterWindowMessageW
SetTimer
SetFocus
SetScrollInfo
SetScrollPos
EndDialog
RemoveMenu
CharNextExA
FillRect
ModifyMenuA
OemToCharBuffW
ClientToScreen
GetNextDlgTabItem
SetDlgItemTextW
GetCursor
SendMessageA
DestroyWindow
EnumChildWindows
SystemParametersInfoW
SetMenuContextHelpId
CountClipboardFormats
GetDesktopWindow
UnregisterClassA
UpdateWindow
GetDC
MoveWindow
ChangeMenuA
GetActiveWindow
IsWindow
LoadCursorW
KillTimer
PostMessageW
BeginPaint
SendMessageW
GetSysColorBrush
MapWindowPoints
GetWindowTextLengthW
ShowWindow
EndPaint
GetWindowLongW
EnumThreadWindows
SetWindowLongW
GetWindowTextW
CreateDialogParamW
GetSysColor
CallWindowProcW
SendDlgItemMessageA
GetDlgItemTextW
GetScrollInfo
ScrollWindowEx
DdeConnectList
LoadIconW
EnableWindow
advapi32
GetLengthSid
CryptAcquireContextA
RegQueryValueExW
LookupAccountNameW
RegOpenKeyExA
CryptDestroyKey
RegQueryValueExA
CryptReleaseContext
CryptExportKey
RegCloseKey
FreeSid
CredWriteW
AllocateAndInitializeSid
GetUserNameW
RegOpenKeyExW
CheckTokenMembership
crypt32
CertCreateCertificateContext
Sections
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ