Static task
static1
Behavioral task
behavioral1
Sample
4b58514f90f09d77a530728e9966c88628fcff8bb4a543576dbc7b07c2e00882.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4b58514f90f09d77a530728e9966c88628fcff8bb4a543576dbc7b07c2e00882.exe
Resource
win10v2004-20220812-en
General
-
Target
4b58514f90f09d77a530728e9966c88628fcff8bb4a543576dbc7b07c2e00882
-
Size
324KB
-
MD5
1f776848e9c8fd31f9cb17f24df308e5
-
SHA1
0e21399b23ad3d9d3d3498b4912ee2632e5ce378
-
SHA256
4b58514f90f09d77a530728e9966c88628fcff8bb4a543576dbc7b07c2e00882
-
SHA512
da0adf60b33024c2e151302a526ee16422104e12db77904ed5ff1f23cc8453c1460b32bbc1d33107c51f5b3512a0d8cabe46509f55ee4a0ebdbb18489dd004ea
-
SSDEEP
6144:ZLWpOcmpK8NDkU9q4YOD9XRSn4zKR8eiFiPWLmfbAwABLis8ycHnTfo6:ZmRiDko5hXrzKjrEmN2LRAT
Malware Config
Signatures
Files
-
4b58514f90f09d77a530728e9966c88628fcff8bb4a543576dbc7b07c2e00882.exe windows x86
7174551a13bef4a3e88c2c0e1d5ab306
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SheSetCurDrive
DragQueryFileW
SHGetPathFromIDListW
SHFreeNameMappings
comdlg32
PageSetupDlgW
GetSaveFileNameA
user32
BeginDeferWindowPos
CharUpperA
SetWindowsHookExW
DdeCreateStringHandleA
IsCharAlphaNumericW
CreateCursor
CharPrevA
GetUpdateRect
UnhookWinEvent
FrameRect
DrawTextExW
GetParent
RegisterClassExA
MessageBoxA
TranslateAcceleratorA
CreateDialogIndirectParamA
LoadCursorW
SetClipboardViewer
EnumDisplayDevicesW
ShowWindow
GetClipboardViewer
GetKeyboardLayout
GetIconInfo
EnumDesktopsW
SetUserObjectInformationA
DefFrameProcA
IsCharAlphaW
GetWindowThreadProcessId
GrayStringW
GetScrollInfo
CreateDialogIndirectParamW
ShowCursor
DestroyWindow
CreateWindowExA
CreateMDIWindowA
IsCharAlphaA
CharUpperBuffA
RegisterClassA
DrawTextA
GetGUIThreadInfo
IsCharUpperW
DlgDirSelectComboBoxExA
UnhookWindowsHook
CreateAcceleratorTableA
GetScrollPos
DdeAccessData
EnumDisplaySettingsExW
ScrollWindow
SetScrollInfo
TranslateMessage
ReleaseCapture
SetRectEmpty
DialogBoxIndirectParamW
VkKeyScanA
HideCaret
LoadCursorA
DefWindowProcA
UnregisterClassA
OpenWindowStationA
DlgDirListW
WindowFromPoint
WINNLSGetIMEHotkey
GetWindowLongW
GetAsyncKeyState
GetForegroundWindow
comctl32
ImageList_SetFilter
InitMUILanguage
ImageList_Duplicate
ImageList_GetBkColor
CreateStatusWindow
CreateToolbar
ImageList_Write
CreateMappedBitmap
CreateUpDownControl
ImageList_SetFlags
ImageList_SetIconSize
ImageList_DragShowNolock
ImageList_AddIcon
ImageList_GetIconSize
ImageList_SetOverlayImage
InitCommonControlsEx
ImageList_Destroy
DrawStatusTextW
DrawStatusText
CreatePropertySheetPageW
ImageList_LoadImageA
ImageList_Read
ImageList_GetFlags
ImageList_Remove
ImageList_DragEnter
kernel32
FreeEnvironmentStringsA
LoadLibraryA
GetFullPathNameA
DebugActiveProcess
GetDriveTypeA
DeleteFiber
SetSystemTime
VirtualFree
CloseHandle
HeapDestroy
GetConsoleTitleW
GetFullPathNameW
GetNumberFormatA
SetConsoleOutputCP
GlobalCompact
GetCommandLineW
TlsAlloc
CompareStringA
GetPrivateProfileSectionNamesW
GetVersionExA
GetCurrentProcessId
HeapSize
GetProcAddress
SetLastError
InitializeCriticalSection
GetSystemTime
GetTickCount
UnmapViewOfFile
SetThreadLocale
GetComputerNameW
GetVersion
WriteConsoleOutputW
GetTimeZoneInformation
LocalUnlock
DeleteCriticalSection
WriteFile
GlobalGetAtomNameW
HeapLock
TlsSetValue
GetModuleHandleA
GetComputerNameA
CreateSemaphoreA
GetFileType
GetConsoleTitleA
QueryPerformanceCounter
FileTimeToLocalFileTime
VirtualQuery
UnlockFile
InterlockedIncrement
ExpandEnvironmentStringsA
VirtualAlloc
OpenSemaphoreA
GetCurrentThreadId
GetEnvironmentStringsW
SetWaitableTimer
GlobalFindAtomA
IsBadWritePtr
HeapValidate
GlobalUnlock
GetConsoleMode
GetStartupInfoA
GetNumberFormatW
EnterCriticalSection
GetModuleFileNameW
GetModuleFileNameA
GetLocalTime
SetFilePointer
MoveFileExW
GetStringTypeExW
GetStartupInfoW
MultiByteToWideChar
GetCurrentProcess
LockFileEx
GetCommandLineA
FindResourceExA
HeapFree
GetSystemTimeAsFileTime
OpenEventW
TlsGetValue
GetProfileSectionA
ReadFile
SetStdHandle
GetLocaleInfoW
CreateFileMappingW
GetProfileSectionW
LCMapStringA
EnumTimeFormatsA
TlsFree
CompareStringW
LeaveCriticalSection
GetCompressedFileSizeW
ExitProcess
GetEnvironmentStrings
GetLastError
GetPrivateProfileStringA
UnhandledExceptionFilter
InterlockedExchange
GetSystemDirectoryW
HeapCreate
GetDiskFreeSpaceExA
GetCPInfo
GetStringTypeW
HeapAlloc
InitializeCriticalSectionAndSpinCount
GetCurrentThread
GetStdHandle
WideCharToMultiByte
FreeLibraryAndExitThread
FindClose
GetStringTypeA
SetEnvironmentVariableA
GetExitCodeThread
SetConsoleCursorPosition
GlobalLock
FlushFileBuffers
SetFileTime
HeapReAlloc
LCMapStringW
FreeEnvironmentStringsW
GetNamedPipeInfo
OpenMutexA
CreateMutexA
lstrcmpW
SetComputerNameW
InterlockedDecrement
GetFileAttributesExW
GetStringTypeExA
SetHandleCount
ExitThread
GetLocaleInfoA
FreeLibrary
TerminateProcess
RtlUnwind
Sections
.text Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ