Static task
static1
Behavioral task
behavioral1
Sample
4edf5efd7c317bc7d59814fb402d7f4857691568b9eb09881f7e7f93e4c9e442.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4edf5efd7c317bc7d59814fb402d7f4857691568b9eb09881f7e7f93e4c9e442.exe
Resource
win10v2004-20221111-en
General
-
Target
4edf5efd7c317bc7d59814fb402d7f4857691568b9eb09881f7e7f93e4c9e442
-
Size
780KB
-
MD5
5dec5a46076ee5ef59a99db1be7fc851
-
SHA1
6688c0623810267e10a9d8f9fb6670bf361ffcce
-
SHA256
4edf5efd7c317bc7d59814fb402d7f4857691568b9eb09881f7e7f93e4c9e442
-
SHA512
5e18893b724933551b1702a02add4971fb7fad20f9bfc14fc90eadbdcc850721636d4bde8326888e214b3e41af70f5b42fdc23fb2f0669037218165f3135cc3e
-
SSDEEP
24576:ZfBkBsnXnXvgEhFW0WeUTMSzTHrqKF14R:ZJnnXXB/ChGMM
Malware Config
Signatures
Files
-
4edf5efd7c317bc7d59814fb402d7f4857691568b9eb09881f7e7f93e4c9e442.exe windows x86
5e6f3a1a9dad93e3a9bd4ad6656fc4b9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeEnvironmentStringsA
SetLastError
SetStdHandle
GetCurrentProcess
RtlUnwind
VirtualQueryEx
LCMapStringA
GetCommandLineW
HeapFree
UnhandledExceptionFilter
ReadFile
GetTimeFormatA
EnterCriticalSection
LCMapStringW
FoldStringW
CloseHandle
HeapDestroy
IsBadWritePtr
GetACP
TlsAlloc
VirtualAlloc
GetOEMCP
GetDateFormatA
OpenMutexA
HeapSize
VirtualProtect
LoadModule
lstrcpy
SetHandleCount
GetFileType
LockResource
GetEnvironmentStrings
GetSystemInfo
VirtualFree
WideCharToMultiByte
TlsSetValue
MapViewOfFileEx
TlsGetValue
SetEnvironmentVariableA
InitializeCriticalSection
GlobalHandle
GetUserDefaultLCID
FreeEnvironmentStringsW
GetTimeZoneInformation
GetCPInfo
CompareStringA
CreateMutexA
TlsFree
GetSystemTimeAsFileTime
EnumSystemLocalesA
InterlockedExchange
GetPrivateProfileStringA
GetLocaleInfoW
WritePrivateProfileSectionA
GetStringTypeW
WriteFile
GetLocaleInfoA
HeapReAlloc
HeapCreate
MultiByteToWideChar
GetTickCount
LeaveCriticalSection
GetModuleHandleA
GetCurrentThread
TerminateProcess
GetStdHandle
QueryPerformanceCounter
CompareStringW
CreateDirectoryA
SetFilePointer
GetStartupInfoA
GetStringTypeA
HeapAlloc
IsValidLocale
GetVersionExA
IsValidCodePage
FlushFileBuffers
VirtualQuery
GetCurrentProcessId
GetEnvironmentStringsW
GetProcAddress
ExitProcess
GetCurrentThreadId
GetModuleFileNameA
LoadLibraryA
ReadFileEx
GetLastError
DeleteCriticalSection
GetProfileStringW
GetCommandLineA
user32
PtInRect
ShowWindow
SetFocus
SetShellWindow
DefMDIChildProcA
UnpackDDElParam
IntersectRect
GetQueueStatus
RegisterWindowMessageA
SetWindowsHookW
DrawIconEx
LockWindowUpdate
GetScrollPos
FindWindowExW
LoadIconA
DestroyWindow
SetUserObjectInformationA
MessageBoxExW
GetMessageA
DefWindowProcA
RegisterClassA
MessageBoxA
DlgDirSelectComboBoxExW
CreateWindowExA
GetCaretPos
EnumDisplaySettingsW
VkKeyScanExW
RegisterClassExA
CharToOemA
DragObject
SetWindowPlacement
LoadImageW
GetTitleBarInfo
SetUserObjectSecurity
comctl32
ImageList_LoadImageA
ImageList_Write
ImageList_Replace
CreateToolbarEx
ImageList_Copy
ImageList_EndDrag
ImageList_AddMasked
ImageList_GetImageInfo
ImageList_Create
ImageList_GetImageRect
ImageList_ReplaceIcon
InitCommonControlsEx
ImageList_SetFlags
ImageList_SetDragCursorImage
ImageList_Destroy
DrawStatusText
ImageList_SetOverlayImage
ImageList_GetFlags
_TrackMouseEvent
ImageList_Remove
ImageList_Add
ImageList_SetBkColor
ImageList_Duplicate
Sections
.text Size: 216KB - Virtual size: 213KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 408KB - Virtual size: 405KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 136KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ