Static task
static1
Behavioral task
behavioral1
Sample
5112362b4ff17622b840e8295fff49823f9d9805f6ff033ca07a868b28cddfa0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5112362b4ff17622b840e8295fff49823f9d9805f6ff033ca07a868b28cddfa0.exe
Resource
win10v2004-20221111-en
General
-
Target
5112362b4ff17622b840e8295fff49823f9d9805f6ff033ca07a868b28cddfa0
-
Size
816KB
-
MD5
9b65c3555e6f3c75ec1f9fa77bc8bcf5
-
SHA1
70a9598ca682d1e4ed5e35968f8e853c358caf5b
-
SHA256
5112362b4ff17622b840e8295fff49823f9d9805f6ff033ca07a868b28cddfa0
-
SHA512
ef8783170ceeed9e5d19cb43196223a2551d0a1ca13c7b51a962e7fdfb060ec6c1c0a4fd272d6beff3facc795195165bdbf9944a5c6a5e5a61c2b0e447c8d6d1
-
SSDEEP
12288:yrKJvwHADw1gYmscvtdZcGkU/fSLBjkCP2LdC+OJLIyTsXUTCsnGfaddjeWUZAgM:yudzw1g7+GZaLBkQpIyIEms9o1eNLB
Malware Config
Signatures
Files
-
5112362b4ff17622b840e8295fff49823f9d9805f6ff033ca07a868b28cddfa0.exe windows x86
383dea671912827b1433bb4d7375c252
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
TerminateProcess
GetExitCodeProcess
GlobalLock
SetEnvironmentVariableA
CloseHandle
ExitProcess
DeleteFileW
VirtualProtect
TlsGetValue
FindFirstFileExW
GetStartupInfoW
GetThreadLocale
GetOEMCP
UnlockFileEx
ExpandEnvironmentStringsW
GetStringTypeW
IsValidCodePage
WriteFileEx
CreateDirectoryW
HeapFree
OpenFileMappingW
FileTimeToDosDateTime
EnumSystemLocalesA
GetVersionExA
SetStdHandle
OpenEventW
IsBadWritePtr
GetLogicalDriveStringsW
GetACP
HeapAlloc
VirtualAlloc
GetDateFormatA
GetEnvironmentStringsW
SetUnhandledExceptionFilter
TlsAlloc
GetUserDefaultLCID
GetCommandLineA
GlobalHandle
CreateSemaphoreW
GetStdHandle
TlsFree
SetCurrentDirectoryA
FindClose
GetTimeZoneInformation
GetSystemTimeAsFileTime
FlushFileBuffers
FreeEnvironmentStringsW
GetCompressedFileSizeW
CompareStringW
GetTimeFormatA
HeapReAlloc
EnterCriticalSection
DeleteAtom
DebugBreak
GetLocaleInfoW
SetLocaleInfoA
OutputDebugStringA
GetProcessHeap
HeapDestroy
LeaveCriticalSection
CompareStringA
ReadFile
SetConsoleCtrlHandler
UnhandledExceptionFilter
GlobalGetAtomNameA
GetModuleHandleA
ReadConsoleOutputW
HeapValidate
CreateMutexW
GetCurrentThreadId
OpenFileMappingA
GetModuleFileNameA
GetCommandLineW
GetStartupInfoA
LoadLibraryA
OpenWaitableTimerW
GetLocaleInfoA
GetFileType
InterlockedIncrement
SetComputerNameA
GetCompressedFileSizeA
WideCharToMultiByte
AddAtomA
GetCurrentThread
GetTickCount
InitializeCriticalSection
HeapCreate
LCMapStringW
GetSystemInfo
CreateNamedPipeA
GetCurrentProcessId
GetCPInfo
InterlockedExchange
SetConsoleCursorPosition
DeleteCriticalSection
QueryPerformanceCounter
IsBadReadPtr
SetFilePointer
LCMapStringA
GetModuleFileNameW
GetCurrentProcess
LoadLibraryExA
GetEnvironmentStrings
VirtualFree
GetFileSize
SetLastError
OpenMutexA
CreateMailslotW
SetHandleCount
GetLastError
GetStringTypeA
IsValidLocale
GetProcAddress
TlsSetValue
WriteFile
InterlockedDecrement
VirtualQuery
FreeEnvironmentStringsA
CreateMutexA
RtlUnwind
lstrcmpi
user32
DestroyWindow
SetMenuDefaultItem
MessageBoxW
GetUpdateRgn
SetWindowPos
GetMenuInfo
GetOpenClipboardWindow
EnumDisplaySettingsA
SetShellWindow
LookupIconIdFromDirectory
SetTimer
EqualRect
UnregisterDeviceNotification
IsCharAlphaNumericA
PtInRect
GetClipboardSequenceNumber
GetCursor
GetInputDesktop
SetWindowPlacement
LoadCursorA
GetMonitorInfoA
SetPropA
GetInputState
SubtractRect
SetUserObjectSecurity
MapVirtualKeyW
SetDlgItemInt
IntersectRect
DlgDirListComboBoxW
CharToOemW
ChangeClipboardChain
EnumPropsW
CharLowerA
CountClipboardFormats
CreateDesktopW
DdeSetUserHandle
CreateWindowExW
IsWindowVisible
GetWindowWord
GetMenuItemID
SendIMEMessageExW
FrameRect
LoadCursorFromFileW
TileChildWindows
MonitorFromPoint
GetMenuState
CallNextHookEx
UnloadKeyboardLayout
GetTabbedTextExtentA
EnumPropsA
AttachThreadInput
FlashWindow
GetMenuStringA
ToAsciiEx
SetWindowRgn
DefWindowProcW
IsCharUpperW
SendNotifyMessageA
RegisterClassA
PeekMessageA
GetShellWindow
GrayStringW
DestroyAcceleratorTable
GetMessageA
ShowWindow
CharNextExA
DrawEdge
RegisterClassExA
ShowCaret
SendDlgItemMessageW
EndTask
KillTimer
SetWindowsHookExA
comctl32
InitMUILanguage
InitCommonControlsEx
ImageList_SetFilter
ImageList_LoadImageW
ImageList_Create
ImageList_DragEnter
comdlg32
GetFileTitleA
PageSetupDlgA
PrintDlgA
Sections
.text Size: 248KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 408KB - Virtual size: 408KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 136KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ