Static task
static1
Behavioral task
behavioral1
Sample
5adb2f3cab7eacbcfc37b66d255321ff7a95c2d1a8460bac8184cc0718600524.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5adb2f3cab7eacbcfc37b66d255321ff7a95c2d1a8460bac8184cc0718600524.exe
Resource
win10v2004-20221111-en
General
-
Target
5adb2f3cab7eacbcfc37b66d255321ff7a95c2d1a8460bac8184cc0718600524
-
Size
692KB
-
MD5
34d4295808654939c0229249f89ef852
-
SHA1
030a4fe9fd389bc9fd1cfa172c4b9a8acdf691b4
-
SHA256
5adb2f3cab7eacbcfc37b66d255321ff7a95c2d1a8460bac8184cc0718600524
-
SHA512
540f828b6ee854ab25f4068f48ceec85781f5f4511a63857b456f2c0c07d84ea879e4fc4f44a0002e40e593234509ddeaa5e129c3b61afea7437010d8cbe5f0f
-
SSDEEP
12288:HWr3jPgrDAOSjpY1wSgVXn7UK5BKnP5G1yUO4IRUC+4Vp5motSuH+5AhX:2r8XAOApY1AXYKBKnP41yU3u+4Vz5tS
Malware Config
Signatures
Files
-
5adb2f3cab7eacbcfc37b66d255321ff7a95c2d1a8460bac8184cc0718600524.exe windows x86
72020be86233f7ad1ba4b931795cfb2d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteProfileSectionA
GetPrivateProfileIntA
WriteFile
GetLongPathNameA
SetEnvironmentVariableA
SetThreadPriority
GetStringTypeW
GetCurrentProcess
GetCPInfo
FindClose
GetCommandLineA
ExitProcess
LCMapStringW
LoadLibraryA
GetProcAddress
LCMapStringA
FreeResource
GetCurrentThreadId
lstrcpy
GetConsoleCursorInfo
LocalLock
DeleteFileA
QueryPerformanceCounter
SetFilePointer
FreeEnvironmentStringsA
LeaveCriticalSection
ReadConsoleOutputW
GetLongPathNameW
DeleteCriticalSection
GetModuleFileNameA
GetCommandLineW
VirtualLock
VirtualAlloc
IsValidCodePage
UnhandledExceptionFilter
OpenFile
InterlockedIncrement
GetComputerNameA
ReadConsoleInputA
GetLocalTime
EnterCriticalSection
HeapDestroy
EnumSystemCodePagesA
GetShortPathNameW
DeleteAtom
CloseHandle
EnumResourceLanguagesA
GetCurrentDirectoryA
SetUnhandledExceptionFilter
TlsFree
FoldStringW
GetVersion
EnumDateFormatsW
FlushInstructionCache
FreeEnvironmentStringsW
GetProcessHeap
IsBadWritePtr
FlushFileBuffers
GetLastError
OpenMutexA
VirtualQuery
GetCompressedFileSizeA
CreateMutexA
GetFullPathNameA
SetWaitableTimer
GetStartupInfoA
TlsGetValue
WideCharToMultiByte
GetDiskFreeSpaceExW
TerminateProcess
SystemTimeToFileTime
CreateRemoteThread
HeapReAlloc
GetCurrentProcessId
ReadFile
SetStdHandle
OpenEventA
IsValidLocale
RtlUnwind
GlobalReAlloc
CreateThread
GetEnvironmentStringsW
EnumTimeFormatsA
GetSystemTime
CreateDirectoryExA
GetSystemTimeAsFileTime
GetStdHandle
InterlockedDecrement
GetTimeZoneInformation
CompareStringA
InterlockedExchangeAdd
GetFileType
HeapFree
HeapCreate
GetConsoleTitleW
GetStringTypeA
GetTickCount
GetStartupInfoW
GetUserDefaultLangID
GetEnvironmentStrings
SetConsoleCtrlHandler
InterlockedExchange
MultiByteToWideChar
SetCurrentDirectoryA
FillConsoleOutputCharacterA
GetCalendarInfoA
ReadConsoleW
WriteConsoleOutputW
TlsSetValue
InitializeCriticalSection
SetConsoleTextAttribute
GetModuleFileNameW
GetCurrencyFormatA
MoveFileW
GetModuleHandleA
VirtualFree
SetLastError
GetDateFormatW
OpenSemaphoreA
GetThreadTimes
RemoveDirectoryW
GetSystemDirectoryW
CreateFileMappingW
ReadConsoleOutputAttribute
ExpandEnvironmentStringsA
GetCurrentThread
SuspendThread
FileTimeToSystemTime
WritePrivateProfileSectionA
HeapAlloc
CompareStringW
SetHandleCount
GetProcessAffinityMask
TlsAlloc
comctl32
CreatePropertySheetPage
GetEffectiveClientRect
InitCommonControlsEx
CreatePropertySheetPageW
ImageList_DragEnter
ImageList_Remove
MakeDragList
ImageList_BeginDrag
CreateStatusWindowW
ImageList_GetFlags
ImageList_Copy
ImageList_GetDragImage
ImageList_DragMove
ImageList_SetOverlayImage
ImageList_Add
CreateMappedBitmap
ImageList_ReplaceIcon
ImageList_GetImageRect
CreateStatusWindowA
ImageList_SetImageCount
ImageList_AddMasked
gdi32
DeleteDC
GetObjectA
GetDIBits
CreateDCW
GetDeviceCaps
wininet
FtpRemoveDirectoryW
FindNextUrlCacheEntryA
ShowClientAuthCerts
advapi32
CryptReleaseContext
GetUserNameW
RegQueryValueW
LogonUserA
CryptAcquireContextW
CryptSetKeyParam
CryptGetDefaultProviderA
LogonUserW
LookupAccountNameA
RegEnumKeyW
CryptGenKey
RegSetValueExW
LookupPrivilegeNameW
RegOpenKeyExA
comdlg32
GetSaveFileNameA
FindTextW
ChooseColorW
user32
ShowWindow
InsertMenuA
GetClipboardViewer
GetUpdateRect
DestroyWindow
RegisterClassExA
PeekMessageA
RegisterClassA
CreateWindowExA
wsprintfA
GetWindowTextLengthA
DefWindowProcW
GetMenuItemCount
CreateDialogParamW
DdeNameService
IsDialogMessageW
ExcludeUpdateRgn
GetWindowDC
CopyImage
CharNextExA
GetWindowRgn
MessageBoxA
Sections
.text Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 448KB - Virtual size: 446KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 140KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ