Static task
static1
Behavioral task
behavioral1
Sample
18093961ec285f53ffc89c53da1b50e1ad0286828b62c26d86ff5b679a1e549d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
18093961ec285f53ffc89c53da1b50e1ad0286828b62c26d86ff5b679a1e549d.exe
Resource
win10v2004-20221111-en
General
-
Target
18093961ec285f53ffc89c53da1b50e1ad0286828b62c26d86ff5b679a1e549d
-
Size
720KB
-
MD5
351c381ffbb97b7d4b74af4feef0f8bd
-
SHA1
0cb0a792ab324478553cb685fcc9c21238b38879
-
SHA256
18093961ec285f53ffc89c53da1b50e1ad0286828b62c26d86ff5b679a1e549d
-
SHA512
e12a18f37d553f29fcfc55d714cab9f35557ab90a0a46d634d935d31ea859c50ea3fe3e42f3e58d575f4ee80b89c5041a40a892f9b3ede45e310153f9ba49900
-
SSDEEP
12288:XBOJ3KEGgq4kPlZLgxL9Z+vKERjPyu7bRDqPbMemoi+OabsgaNqRnC6Y:xI3K6qhn8L8RryAD27fiub4wC6Y
Malware Config
Signatures
Files
-
18093961ec285f53ffc89c53da1b50e1ad0286828b62c26d86ff5b679a1e549d.exe windows x86
fb8ae4750a3da7379a99f43be85371cb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
DragQueryFileW
ExtractIconExW
user32
PostQuitMessage
IsZoomed
DeferWindowPos
GetClipboardData
DispatchMessageW
ShowWindow
IsWindowVisible
InsertMenuItemW
GetMenuCheckMarkDimensions
IntersectRect
GetDlgCtrlID
SetFocus
MessageBeep
ReleaseDC
GetSysColor
ValidateRect
LoadIconW
InflateRect
GetLastActivePopup
GetMenuItemCount
ScrollWindowEx
AppendMenuW
PtInRect
GetMenu
IsDialogMessageW
GetSubMenu
WindowFromPoint
ReuseDDElParam
EnumChildWindows
GetWindowThreadProcessId
KillTimer
OpenClipboard
PeekMessageW
MessageBoxW
GetDoubleClickTime
EnableWindow
GetParent
GetMessagePos
DragDetect
SetWindowPos
SetRectEmpty
GetWindowTextW
SetWindowLongW
IsChild
CreateWindowExW
UnionRect
DrawIconEx
ScreenToClient
UnhookWindowsHookEx
GetSysColorBrush
SetCursorPos
InsertMenuW
SetWindowRgn
GetMenuState
AdjustWindowRectEx
EmptyClipboard
DestroyMenu
GetClassLongW
EndDialog
DrawFocusRect
SetMenuItemBitmaps
LoadBitmapW
GetMenuItemInfoW
SetRect
DestroyCursor
MoveWindow
GetWindowRect
GetCursorPos
GetDCEx
EndDeferWindowPos
GetTopWindow
SystemParametersInfoW
DestroyAcceleratorTable
SendMessageA
IsIconic
ShowScrollBar
OffsetRect
IsWindowEnabled
GetMenuItemID
SetWindowPlacement
TrackPopupMenu
SetWindowTextW
FrameRect
GetWindowLongW
EndPaint
MapWindowPoints
GetSystemMenu
TranslateMessage
RegisterClassW
GetWindowPlacement
GetScrollInfo
CheckDlgButton
GetIconInfo
CallWindowProcW
IsClipboardFormatAvailable
wsprintfW
DrawStateW
BringWindowToTop
GetDlgItemInt
GetNextDlgTabItem
SetMenuItemInfoW
CallNextHookEx
SetClipboardData
DrawMenuBar
GetScrollPos
SetTimer
DrawIcon
CreatePopupMenu
ChildWindowFromPoint
RegisterClipboardFormatW
UpdateWindow
CopyRect
GetDlgItem
EnableMenuItem
DrawFrameControl
SetActiveWindow
GetSystemMetrics
SetMenu
ClientToScreen
BeginPaint
BeginDeferWindowPos
DeleteMenu
ModifyMenuW
DestroyWindow
GetWindowDC
GetWindow
SetCapture
DestroyIcon
IsRectEmpty
EnumWindows
PostMessageW
GetForegroundWindow
GetDesktopWindow
DrawTextW
DefWindowProcW
SetScrollInfo
GetCapture
GetAsyncKeyState
LoadCursorW
GetUpdateRect
SetMenuDefaultItem
IsMenu
RemoveMenu
MapDialogRect
GetFocus
GetKeyState
GetClientRect
InvalidateRect
ReleaseCapture
RegisterClassExW
CheckMenuItem
SetCursor
IsWindow
RedrawWindow
GetDC
SystemParametersInfoA
GetMenuStringW
FillRect
SetParent
TrackPopupMenuEx
LoadStringW
ScrollWindow
GetActiveWindow
FindWindowW
oleaut32
LoadTypeLi
comctl32
CreatePropertySheetPageW
ImageList_GetIcon
ImageList_AddMasked
ImageList_GetImageCount
ord17
ImageList_Create
ImageList_GetImageInfo
InitCommonControlsEx
ImageList_Destroy
CreateStatusWindowW
PropertySheetW
ImageList_GetIconSize
ImageList_LoadImageW
ImageList_ReplaceIcon
ImageList_Draw
_TrackMouseEvent
advapi32
RegSetValueExA
RegCreateKeyExA
RegEnumKeyW
RegGetKeySecurity
RegOpenKeyExA
GetUserNameW
RegCloseKey
SetSecurityDescriptorDacl
kernel32
GetTimeFormatA
GetEnvironmentStrings
VirtualFree
HeapReAlloc
GetCurrentThreadId
GetModuleFileNameW
HeapSize
GetStartupInfoW
IsBadCodePtr
TlsSetValue
RtlUnwind
LCMapStringW
HeapDestroy
GetProcAddress
UnhandledExceptionFilter
GetStringTypeW
ExitProcess
EnterCriticalSection
VirtualAlloc
SetEnvironmentVariableA
SetLastError
GetEnvironmentStringsW
GetStdHandle
DeleteCriticalSection
GetCommandLineW
GetTimeZoneInformation
CompareStringW
SetUnhandledExceptionFilter
LoadLibraryA
ReadFile
GetLastError
CompareStringA
VirtualProtect
GetACP
GetStringTypeA
GetFileType
InterlockedExchange
InitializeCriticalSection
GetModuleHandleA
FlushFileBuffers
TlsAlloc
GetVersionExA
GetStartupInfoA
GetLocaleInfoA
GetCurrentProcessId
MultiByteToWideChar
GetCurrentProcess
HeapFree
LeaveCriticalSection
QueryPerformanceCounter
LCMapStringA
TlsGetValue
GetDateFormatA
SetFilePointer
WideCharToMultiByte
SetHandleCount
GetCommandLineA
GetModuleHandleW
FreeEnvironmentStringsW
TerminateProcess
GetCPInfo
CreateMutexW
GetModuleFileNameA
LoadLibraryW
HeapCreate
GetSystemInfo
FreeEnvironmentStringsA
GetTickCount
CloseHandle
SetStdHandle
TlsFree
GetOEMCP
VirtualQuery
HeapAlloc
WriteFile
RaiseException
GetSystemTimeAsFileTime
Sections
.text Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 472KB - Virtual size: 470KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ