Static task
static1
Behavioral task
behavioral1
Sample
50bcadeb494a343f341d4f16a5af25a18cacd785b2cd9adc753876357ed2fbd3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
50bcadeb494a343f341d4f16a5af25a18cacd785b2cd9adc753876357ed2fbd3.exe
Resource
win10v2004-20221111-en
General
-
Target
50bcadeb494a343f341d4f16a5af25a18cacd785b2cd9adc753876357ed2fbd3
-
Size
144KB
-
MD5
e4ad1444350ff3a440642f21593fd02e
-
SHA1
6d7249e39e41dbf94915fc93db6d0a8f08ac32c8
-
SHA256
50bcadeb494a343f341d4f16a5af25a18cacd785b2cd9adc753876357ed2fbd3
-
SHA512
09eef0fb89fc0a0f03759a3d0e230dacbf6f8ae7c4c808939295f9b2a7e14dc41dfc56a9e8b3f33e88431d1cebd53252578504ee37fa94d256e9e85cab825cea
-
SSDEEP
1536:xWIwXSFCk4XeRwHeqT1LV2mfHCO1TdJQF5y6f4GDrP1rcNE6yUGxEQ0It5ubiqkk:xtFCfXeWsjgTt6AGDhB6y7WetMGqI
Malware Config
Signatures
Files
-
50bcadeb494a343f341d4f16a5af25a18cacd785b2cd9adc753876357ed2fbd3.exe windows x86
65a4d38b1de085d8ff39c10d226ab157
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
GetModuleHandleA
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
FreeLibrary
GetProcessVersion
GetFileAttributesA
GetFileSize
GetFileTime
SetErrorMode
GetCPInfo
GetOEMCP
FileTimeToSystemTime
FileTimeToLocalFileTime
RtlUnwind
ExitProcess
TerminateProcess
GetTimeZoneInformation
GetSystemTime
GetLocalTime
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
RaiseException
HeapReAlloc
HeapSize
GetACP
GetCurrentDirectoryA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
lstrcatA
WritePrivateProfileStringA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GetDriveTypeA
GetCurrentProcessId
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
GlobalUnlock
GlobalFree
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
FindFirstFileA
FindClose
lstrcpyA
LoadLibraryA
GetProcAddress
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
GetCurrentProcess
DeleteFileA
DuplicateHandle
GetLastError
LocalFree
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
CreateFileA
WriteFile
SetFileAttributesA
CreateToolhelp32Snapshot
Process32First
OpenProcess
GetExitCodeProcess
CloseHandle
Process32Next
Sleep
GetTempPathA
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempFileNameA
user32
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
GetSysColorBrush
LoadStringA
DestroyMenu
SetWindowPos
SetWindowLongA
SetForegroundWindow
GrayStringA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
GetMenuItemCount
UnhookWindowsHookEx
GetWindowTextA
SetWindowTextA
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetClassNameA
ClientToScreen
LoadCursorA
GetCapture
GetSystemMetrics
CharUpperA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
RegisterWindowMessageA
IsWindowEnabled
GetWindowLongA
MessageBoxA
EnableWindow
SetCursor
SendMessageA
PostQuitMessage
PostMessageA
wsprintfA
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetFocus
GetDlgItem
ShowWindow
UnregisterClassA
gdi32
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetObjectA
SetBkColor
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
CreateBitmap
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
shell32
SHGetSpecialFolderPathA
ShellExecuteA
comctl32
ord17
urlmon
URLDownloadToFileA
wininet
DeleteUrlCacheEntry
InternetReadFile
InternetQueryDataAvailable
InternetCloseHandle
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
psapi
GetModuleFileNameExA
Sections
.text Size: 92KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ