Static task
static1
Behavioral task
behavioral1
Sample
14c8df31433fa4f1e997904787c14b37da390f5c0a56b8b4db98b4b8657bfe20.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
14c8df31433fa4f1e997904787c14b37da390f5c0a56b8b4db98b4b8657bfe20.exe
Resource
win10v2004-20220901-en
General
-
Target
14c8df31433fa4f1e997904787c14b37da390f5c0a56b8b4db98b4b8657bfe20
-
Size
185KB
-
MD5
13cdbce693c34ef15c805b11ca117285
-
SHA1
068da46a564765b947a70fceccb7a4a0f544e4de
-
SHA256
14c8df31433fa4f1e997904787c14b37da390f5c0a56b8b4db98b4b8657bfe20
-
SHA512
4ed210be121d283d552cba427c9911db0d35f328e3aa2f331b74d87af76d13a13a89ed53daaa38e9933080d469881fc66b960aace1d79832aa589bb5d58e9262
-
SSDEEP
3072:6UWrwso1V8iyMs53jtSc7BREncUCzfKuzstLuICUItzDQIVUApAYAJjPeJ:6hrvQ8tF/xIncUCktLuICzDQqSg
Malware Config
Signatures
Files
-
14c8df31433fa4f1e997904787c14b37da390f5c0a56b8b4db98b4b8657bfe20.exe windows x86
86115a5fb9ed18736b7be2eaa57e66ff
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DrawAnimatedRects
InsertMenuItemA
SystemParametersInfoA
IntersectRect
GetClipboardData
GetMenu
PeekMessageA
LoadKeyboardLayoutA
IsWindowUnicode
TranslateMDISysAccel
GetDlgItem
TranslateMessage
CharNextW
SetScrollRange
DrawIcon
MessageBoxA
GetWindowRect
ShowScrollBar
ShowOwnedPopups
SetParent
GetWindow
GetDC
GetFocus
RegisterClassA
AdjustWindowRectEx
GetWindowTextA
MessageBeep
DestroyIcon
CharNextA
UnhookWindowsHookEx
SetCapture
DestroyWindow
MoveWindow
EnableMenuItem
GetMessagePos
GetSysColor
FillRect
RemovePropA
InsertMenuA
GetParent
OpenClipboard
KillTimer
SetForegroundWindow
CreateIcon
FindWindowA
IsZoomed
EnumWindows
IsDialogMessageW
InvalidateRect
EnumChildWindows
IsWindow
GetCursor
PeekMessageW
GetSysColorBrush
GetSystemMenu
GetKeyState
PtInRect
BeginPaint
EqualRect
SetRect
IsDialogMessageA
LoadIconA
GetKeyNameTextA
EmptyClipboard
SetCursor
GetScrollInfo
GetMenuItemInfoA
GetTopWindow
GetWindowLongA
DeleteMenu
ReleaseCapture
GetCapture
GetKeyboardState
GetDCEx
SetMenu
IsIconic
GetKeyboardType
GetDesktopWindow
SetWindowPos
GetWindowDC
GetSystemMetrics
MapWindowPoints
IsChild
GetClassInfoA
DrawIconEx
SetPropA
DestroyMenu
UpdateWindow
DefFrameProcA
SetWindowLongA
GetKeyboardLayoutList
WaitMessage
OemToCharA
CharLowerBuffA
GetForegroundWindow
RegisterWindowMessageA
SetActiveWindow
GetKeyboardLayoutNameA
SetScrollPos
EnableScrollBar
ScreenToClient
ChildWindowFromPoint
MapVirtualKeyA
FrameRect
DrawEdge
GetWindowPlacement
ActivateKeyboardLayout
IsRectEmpty
GetActiveWindow
SetScrollInfo
CheckMenuItem
SetWindowPlacement
SetWindowsHookExA
SetMenuItemInfoA
GetMenuStringA
DispatchMessageW
GetIconInfo
TrackPopupMenu
SetClassLongA
GetWindowLongW
EnumThreadWindows
DefMDIChildProcA
DispatchMessageA
CallWindowProcA
SendMessageA
UnregisterClassA
CreatePopupMenu
SetFocus
GetScrollPos
EndPaint
SetWindowTextA
GetKeyboardLayout
CallNextHookEx
GetClassNameA
LoadStringA
GetSubMenu
RedrawWindow
LoadCursorA
DestroyCursor
GetMenuState
ReleaseDC
EnableWindow
CreateMenu
CharLowerA
GetCursorPos
IsWindowVisible
CharToOemA
CreateWindowExA
IsWindowEnabled
WindowFromPoint
DrawFrameControl
GetWindowThreadProcessId
GetClassLongA
MsgWaitForMultipleObjects
DrawTextA
PostMessageA
GetMenuItemID
SetClipboardData
ClientToScreen
InflateRect
RemoveMenu
ScrollWindow
GetMenuItemCount
DefWindowProcA
SetWindowLongW
RegisterClipboardFormatA
CharUpperBuffA
wsprintfA
GetScrollRange
SetTimer
GetClientRect
PostQuitMessage
shlwapi
SHEnumValueA
SHQueryInfoKeyA
PathFileExistsA
SHDeleteValueA
SHDeleteKeyA
SHSetValueA
SHGetValueA
advapi32
RegQueryValueA
comctl32
ImageList_Read
ImageList_Write
ImageList_DrawEx
ImageList_Draw
ImageList_Add
ImageList_GetBkColor
shell32
SHGetFileInfoA
Shell_NotifyIconA
SHGetDiskFreeSpaceA
kernel32
GlobalAlloc
GetProcAddress
MoveFileExA
SetFilePointer
VirtualAllocEx
ResetEvent
CloseHandle
lstrlenA
Sleep
GlobalFindAtomA
GetCPInfo
GetModuleHandleA
GetStdHandle
GlobalAddAtomA
ExitProcess
version
GetFileVersionInfoA
VerFindFileA
VerInstallFileA
gdi32
SelectObject
Sections
CODE Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tls Size: 6KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 145KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 961B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE