Static task
static1
Behavioral task
behavioral1
Sample
f36216d9c7b8fd7988d6c5ae1b82d276076fd6b7caa39540e40594401c7a1b45.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f36216d9c7b8fd7988d6c5ae1b82d276076fd6b7caa39540e40594401c7a1b45.exe
Resource
win10v2004-20220812-en
General
-
Target
f36216d9c7b8fd7988d6c5ae1b82d276076fd6b7caa39540e40594401c7a1b45
-
Size
892KB
-
MD5
514515e596ae928fde32c0b2050a4586
-
SHA1
fbbed1ae6df993e0d8043910f99c833ce180e594
-
SHA256
f36216d9c7b8fd7988d6c5ae1b82d276076fd6b7caa39540e40594401c7a1b45
-
SHA512
2e0a68d2a5e9635aad88db5456e187106728c5aa86fbb69418b7762c74c09bdd7c1101d18cd8d7c3185cbeb9e3998f84a534d4def418cc14dc4515adaf2c1f70
-
SSDEEP
12288:05MJmFNtjvdRQveoYqy8zVqD/KplSY4sCAk6En5bV:bJmFNtrdRAYqy8zVqDKpKsd+nlV
Malware Config
Signatures
Files
-
f36216d9c7b8fd7988d6c5ae1b82d276076fd6b7caa39540e40594401c7a1b45.exe windows x86
8b1ab0ee099438229b16dd8d98a64bac
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesW
GetFileType
GetFullPathNameW
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleFileNameW
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemDirectoryW
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetVersionExA
GetVersionExW
GetWindowsDirectoryW
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsBadCodePtr
IsBadReadPtr
IsBadWritePtr
GetEnvironmentStringsW
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
MultiByteToWideChar
QueryPerformanceCounter
ReadFile
RtlUnwind
SetEndOfFile
SetEvent
SetFilePointer
SetHandleCount
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcmpW
lstrcpyW
lstrlenA
lstrlenW
GetEnvironmentStrings
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetCurrentDirectoryW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetACP
FreeLibrary
FreeEnvironmentStringsW
FreeEnvironmentStringsA
FlushFileBuffers
ExitThread
ExitProcess
EnterCriticalSection
DeleteCriticalSection
CreateThread
CreateFileW
CreateEventW
CompareFileTime
CloseHandle
Sleep
GetModuleHandleA
LCMapStringA
VirtualAllocEx
user32
LoadStringW
MessageBoxA
MessageBoxW
MsgWaitForMultipleObjects
PeekMessageW
PostMessageW
PostQuitMessage
ReleaseDC
SendMessageW
SetDlgItemInt
SetDlgItemTextW
SetFocus
SetForegroundWindow
SetTimer
SetWindowPos
SetWindowTextW
SetWindowsHookExW
ShowWindow
TranslateMessage
UnhookWindowsHookEx
UpdateWindow
wsprintfA
wsprintfW
LoadStringA
IsDialogMessageW
GetWindowRect
GetWindowLongW
GetKeyState
GetFocus
GetDlgItemTextW
GetDlgItemInt
GetDlgItem
GetDesktopWindow
GetDC
GetClientRect
EndDialog
EnableWindow
DispatchMessageW
DialogBoxParamW
DestroyWindow
CreateDialogParamW
CheckRadioButton
CheckDlgButton
CallNextHookEx
AdjustWindowRectEx
LoadCursorW
LoadIconW
GetSysColor
LoadIconA
IsWindowEnabled
KillTimer
gdi32
GetTextExtentPointW
GetBkMode
GetColorSpace
CreateMetaFileW
CreatePatternBrush
DeleteColorSpace
CreateSolidBrush
comdlg32
GetSaveFileNameW
advapi32
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegNotifyChangeKeyValue
RegFlushKey
RegEnumValueW
RegEnumKeyW
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
shell32
ShellExecuteW
ole32
CoInitialize
CoInitializeSecurity
CoUninitialize
CoCreateInstance
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tfffa0 Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 763KB - Virtual size: 762KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 91KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ