Static task
static1
Behavioral task
behavioral1
Sample
4459eccd3ff12fe948420350acf32733b02f902f44856df608c58e0dd5ab397f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4459eccd3ff12fe948420350acf32733b02f902f44856df608c58e0dd5ab397f.exe
Resource
win10v2004-20220901-en
General
-
Target
4459eccd3ff12fe948420350acf32733b02f902f44856df608c58e0dd5ab397f
-
Size
257KB
-
MD5
45335c1aea7fee9b6717e399de9d12a0
-
SHA1
71ee2acf9d2d7a1f6ace61ab55f88c2b4faded3d
-
SHA256
4459eccd3ff12fe948420350acf32733b02f902f44856df608c58e0dd5ab397f
-
SHA512
d1e315a8f45a122de12bf023b05d60ae1fb216ce9f50917719b982d6cec033ae9b192f1b6f9fe6ba9ce7a38a7a04f9227f30ee3ebab2484c1d58c7ec2da4ada5
-
SSDEEP
3072:xOzjAuUfkkPk4f/VUS/zQeMOXJ0n8eUu5J98WCNYMK6RsjFys4Ul6ta:eVUv/CSLQbu0jUu5BwXRsAMloa
Malware Config
Signatures
Files
-
4459eccd3ff12fe948420350acf32733b02f902f44856df608c58e0dd5ab397f.exe windows x86
7b04ecdcc5019f6daaef5a5f35122b98
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetProcAddress
GetACP
VirtualAlloc
GetCurrentThread
GetOEMCP
GetStartupInfoA
ReleaseMutex
CreateFileMappingW
HeapFree
UnmapViewOfFile
CreateEventW
CreateThread
WaitForMultipleObjects
CreateMutexW
SetEvent
WaitForSingleObject
TerminateThread
GetExitCodeThread
GetExitCodeProcess
CloseHandle
CreateProcessW
Sleep
GetVersionExW
GetModuleHandleW
InitializeCriticalSectionAndSpinCount
EnterCriticalSection
GetProcessHeap
HeapAlloc
OpenFileMappingW
OpenEventW
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
FreeLibrary
GetCommandLineW
GetSystemDirectoryW
LoadLibraryA
MapViewOfFile
lstrcpyW
GetLastError
LoadLibraryW
DeleteCriticalSection
LeaveCriticalSection
user32
LoadCursorA
LoadCursorW
GetWindowRect
LoadStringW
GetSysColorBrush
RegisterClassW
InvalidateRgn
DefWindowProcW
GetClientRect
BeginPaint
EndPaint
UnregisterClassW
GetDesktopWindow
GetWindowLongW
EnableWindow
DialogBoxParamW
IsWindow
GetParent
GetDlgItem
EndDialog
LoadIconW
SendDlgItemMessageW
MessageBoxW
PostMessageW
SetWindowLongW
SystemParametersInfoW
GetDC
ReleaseDC
SendMessageW
EnumWindows
GetSystemMetrics
SetForegroundWindow
GetWindowThreadProcessId
GetClassNameW
SetWindowPos
msvcrt
_controlfp
__dllonexit
_onexit
__p__fmode
__p__commode
fopen
_XcptFilter
_exit
_adjust_fdiv
_except_handler3
wcstok
swprintf
srand
_wcsnicmp
wcsncat
wcslen
wcsncpy
fclose
fflush
_vsnprintf
fputs
vfprintf
__setusermatherr
_initterm
__getmainargs
_acmdln
_cexit
_c_exit
exit
_wcsicmp
advapi32
RegOpenKeyA
Sections
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata51 Size: 238KB - Virtual size: 238KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ggg22 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata52 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ