Static task
static1
Behavioral task
behavioral1
Sample
123b4046c59046e4dae772fa80a8b91119e194c139bda673c40228c39a01ac10.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
123b4046c59046e4dae772fa80a8b91119e194c139bda673c40228c39a01ac10.exe
Resource
win10v2004-20220812-en
General
-
Target
123b4046c59046e4dae772fa80a8b91119e194c139bda673c40228c39a01ac10
-
Size
696KB
-
MD5
e864fe264888dfdcaa446c57458228b5
-
SHA1
1c1d737e5881e87de76e0fc3f8b3f56ad73c0da7
-
SHA256
123b4046c59046e4dae772fa80a8b91119e194c139bda673c40228c39a01ac10
-
SHA512
c04c13997079923b28d1eaaa5790c175a12d42e2058165662b91e74cdbb730687da8e65b8535041e859cd45ad8aaee210250d8719f2cefaf53da5cb1ea148aa5
-
SSDEEP
12288:KjcbAj+aEWxXK8/rPUpgYn8+xzqZilLXLgy2IUebvstyzhpgfO+mDE:7bAj+anVK8/bUSWZQDycKvstMhYZqE
Malware Config
Signatures
Files
-
123b4046c59046e4dae772fa80a8b91119e194c139bda673c40228c39a01ac10.exe windows x86
0ba2e8468f0d111c21feace4912354c6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
PrintDlgW
LoadAlterBitmap
kernel32
VirtualFree
GetCurrentProcess
RtlUnwind
GetCalendarInfoW
HeapFree
VirtualAlloc
SetEnvironmentVariableA
MultiByteToWideChar
GetCurrentThreadId
FreeEnvironmentStringsA
SetWaitableTimer
SetHandleCount
DeleteCriticalSection
InterlockedIncrement
IsBadWritePtr
GetConsoleMode
GetDateFormatA
GetUserDefaultLCID
GetLastError
TlsGetValue
GetProcAddress
CreateFileMappingW
SetStdHandle
CloseHandle
GetModuleFileNameW
GetStringTypeExW
GetEnvironmentStrings
GetPrivateProfileSectionW
SetConsoleCP
GetFileType
GetStringTypeA
GetCommandLineW
GetSystemInfo
DebugBreak
EnumSystemLocalesA
GetFileAttributesExA
FindNextFileA
OutputDebugStringA
LoadLibraryA
InterlockedExchangeAdd
TerminateProcess
TlsSetValue
TerminateThread
CreateMutexA
GetLocaleInfoW
UnhandledExceptionFilter
GetOEMCP
SetLastError
IsValidCodePage
LCMapStringA
GetTimeZoneInformation
HeapDestroy
HeapAlloc
ExitProcess
QueryPerformanceCounter
VirtualProtect
TlsAlloc
GetModuleFileNameA
LeaveCriticalSection
WideCharToMultiByte
OpenFileMappingW
ReadFile
InterlockedExchange
GetStartupInfoW
GetACP
SetConsoleCtrlHandler
GetCommandLineA
HeapValidate
TlsFree
OpenEventA
ReadConsoleOutputCharacterW
GetPrivateProfileStringW
FreeEnvironmentStringsW
IsValidLocale
DeleteAtom
GlobalFindAtomA
GetLocaleInfoA
GlobalAlloc
GetEnvironmentStringsW
GetStartupInfoA
CreateProcessW
CompareStringW
GetTickCount
GetCurrentThread
HeapReAlloc
GetTimeFormatA
GetCurrentProcessId
WriteFile
InitializeCriticalSection
GetStringTypeW
ReleaseSemaphore
GetLogicalDriveStringsA
InterlockedDecrement
GetCurrencyFormatA
GetModuleHandleA
IsBadReadPtr
DeleteFileW
GetVersionExA
GetStdHandle
GetSystemTimeAsFileTime
GetCPInfo
GetDiskFreeSpaceExA
VirtualQuery
FlushFileBuffers
FileTimeToDosDateTime
EnterCriticalSection
CreateMailslotA
DeleteFileA
OpenMutexA
LCMapStringW
CompareStringA
HeapCreate
EnumDateFormatsExA
OpenMutexW
SetFilePointer
comctl32
InitCommonControlsEx
MakeDragList
ImageList_Draw
ImageList_SetDragCursorImage
ImageList_DragShowNolock
CreatePropertySheetPage
gdi32
GetBkMode
GetDIBits
GetTextMetricsW
PlayEnhMetaFile
GetCharacterPlacementA
GetTextAlign
CreatePalette
AddFontResourceA
GetLayout
GetTextExtentPoint32A
LPtoDP
CreateDIBitmap
GetEnhMetaFileHeader
user32
IsWindowUnicode
CloseDesktop
GetNextDlgGroupItem
ClipCursor
CreateWindowExA
DdeUninitialize
TabbedTextOutW
ScrollWindow
ShowWindow
DestroyWindow
OemKeyScan
SetClipboardData
GetCaretPos
MessageBoxA
CascadeChildWindows
RegisterClassExA
VkKeyScanA
GetMenuItemRect
EnumDisplayDevicesW
DefWindowProcA
ToAsciiEx
DdeQueryStringW
PeekMessageA
RegisterClassA
ReuseDDElParam
advapi32
CryptGetUserKey
RegSaveKeyW
LookupAccountNameA
RegLoadKeyA
LookupPrivilegeDisplayNameA
RegEnumValueW
CryptDeriveKey
RegSetKeySecurity
LookupSecurityDescriptorPartsW
LookupAccountSidW
CryptEnumProvidersA
RegOpenKeyExA
CryptAcquireContextW
RegSetValueExW
shell32
ShellExecuteExA
Sections
.text Size: 212KB - Virtual size: 210KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 272KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ