Static task
static1
Behavioral task
behavioral1
Sample
16ebc350587c1199dd87bc05f793f872b8c9f767da303567ff3fda0e483641f9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
16ebc350587c1199dd87bc05f793f872b8c9f767da303567ff3fda0e483641f9.exe
Resource
win10v2004-20221111-en
General
-
Target
16ebc350587c1199dd87bc05f793f872b8c9f767da303567ff3fda0e483641f9
-
Size
596KB
-
MD5
e76e99baeaaeba381aa5238ee519b2af
-
SHA1
416874ca5e346a03d628e79ca49dfad05e2efc66
-
SHA256
16ebc350587c1199dd87bc05f793f872b8c9f767da303567ff3fda0e483641f9
-
SHA512
30184c22b55d15cf58f1e48b14b17e20067f60a5a2b725b92192ca5542478553a9a25697148a888f8a9ef459a2e287c7cd7fcf85922caee9e8820225bfbc1bcb
-
SSDEEP
12288:h171VkfZTs8B3IdPP5d2SFFx5MhzOAjZSv2gwl195P+wUV4Skezm9:/71V2Z9B3IdPr242rrvPeo
Malware Config
Signatures
Files
-
16ebc350587c1199dd87bc05f793f872b8c9f767da303567ff3fda0e483641f9.exe windows x86
e70b7a7d1955e721338d8150cc060302
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetPathFromIDListA
SHGetNewLinkInfo
user32
DdeConnect
GetKeyState
GetClipboardFormatNameA
GrayStringA
DestroyCursor
GetClipboardData
DdePostAdvise
OemToCharBuffW
GetUserObjectInformationW
DestroyWindow
MessageBoxA
BlockInput
DragDetect
AppendMenuW
DialogBoxParamW
OemToCharBuffA
CreateCaret
GetCaretPos
RegisterClassW
MessageBoxW
GetDlgItemInt
ClientToScreen
GetCapture
OpenWindowStationW
RegisterClassExA
CreateWindowExW
RegisterClassA
ShowWindow
CharToOemA
DefWindowProcA
ChangeDisplaySettingsA
GetSysColor
comctl32
DrawStatusText
ImageList_DragShowNolock
DrawInsert
ImageList_DrawIndirect
ImageList_Create
CreateStatusWindowA
DestroyPropertySheetPage
ImageList_LoadImageA
ImageList_Remove
ImageList_Destroy
ImageList_DragMove
InitCommonControlsEx
ImageList_SetBkColor
ImageList_LoadImageW
ImageList_SetFilter
ImageList_GetIconSize
ImageList_Draw
ImageList_SetFlags
ImageList_EndDrag
ImageList_SetIconSize
CreateStatusWindow
ImageList_Merge
ImageList_Replace
kernel32
GetVersion
GetAtomNameA
IsBadWritePtr
GetStartupInfoW
SetStdHandle
GetLongPathNameW
GetLocalTime
EnterCriticalSection
TlsFree
GetDiskFreeSpaceExA
SetFilePointer
GetACP
GetCurrentProcessId
WideCharToMultiByte
GlobalFix
GetCalendarInfoW
EnumCalendarInfoW
TlsGetValue
GetStartupInfoA
CloseHandle
LCMapStringW
OpenMutexA
UnhandledExceptionFilter
TerminateProcess
GetLocaleInfoA
GetStringTypeW
UnlockFile
GlobalHandle
GetTickCount
GetEnvironmentStrings
WriteConsoleW
FoldStringW
RtlUnwind
LeaveCriticalSection
WaitForDebugEvent
WaitCommEvent
FillConsoleOutputCharacterW
LoadLibraryA
GetModuleFileNameA
LCMapStringA
InterlockedDecrement
MapViewOfFile
GetPrivateProfileSectionW
GetSystemDirectoryA
ReadConsoleOutputA
GetCPInfo
VirtualProtectEx
InitializeCriticalSection
TlsSetValue
CompareStringW
CompareStringA
FreeLibraryAndExitThread
CreateDirectoryW
GetCommandLineA
GetTimeZoneInformation
InterlockedExchange
MoveFileA
VirtualQuery
GetCurrentThread
CreateDirectoryExW
WriteFile
EnumTimeFormatsW
SetEnvironmentVariableA
GetPrivateProfileStringA
GetSystemTimeAsFileTime
VirtualAlloc
DeleteCriticalSection
HeapReAlloc
GetProcessHeaps
SetHandleCount
HeapDestroy
GetSystemTime
MultiByteToWideChar
SetSystemTime
GetTimeFormatW
GetDateFormatA
ExitProcess
GetStringTypeExA
GetFileType
HeapAlloc
GetModuleHandleA
TlsAlloc
WaitForMultipleObjectsEx
GlobalAddAtomW
QueryPerformanceCounter
SetThreadLocale
EnumSystemCodePagesW
ReadFile
WriteProfileStringA
GetStdHandle
CreateMutexA
FlushConsoleInputBuffer
lstrcmpA
GetLastError
HeapCreate
WriteConsoleOutputAttribute
LocalFlags
GetCurrentProcess
GetStringTypeA
SetLastError
LocalLock
FindResourceExA
GetDiskFreeSpaceA
FreeEnvironmentStringsW
HeapFree
GlobalFindAtomW
WaitForSingleObjectEx
GetCurrentThreadId
ReadConsoleOutputAttribute
GetOEMCP
lstrcpyn
lstrcpyW
FlushFileBuffers
VirtualFree
lstrcmpiW
InterlockedIncrement
InterlockedCompareExchange
GetCurrencyFormatA
GetPrivateProfileStructW
GetProcAddress
lstrcatA
GetEnvironmentStringsW
MapViewOfFileEx
FreeEnvironmentStringsA
Sections
.text Size: 188KB - Virtual size: 185KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 252KB - Virtual size: 251KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 139KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ