Static task
static1
Behavioral task
behavioral1
Sample
f5c43652d6a41a68e12b99930936b7873eb15231a40c567672da84566bb6fa55.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f5c43652d6a41a68e12b99930936b7873eb15231a40c567672da84566bb6fa55.exe
Resource
win10v2004-20220812-en
General
-
Target
f5c43652d6a41a68e12b99930936b7873eb15231a40c567672da84566bb6fa55
-
Size
231KB
-
MD5
9dd3b36a19aa0d179130884cf542dc68
-
SHA1
a82d96c27e87b9d38eca4adf195597b183469f1a
-
SHA256
f5c43652d6a41a68e12b99930936b7873eb15231a40c567672da84566bb6fa55
-
SHA512
19cdec29215d6e82b1a520fae392402471d0f211530922c4be3ed5c59e3e1cbe7e7b5e34dfb9c8a4024ab4e7f4a4b29291e4f9ad16e638631a9535ea9097a3c3
-
SSDEEP
6144:y0M8kXVGT7MdYZCh/4NF8W/6zWsl4w2OdxCZVTRav:ERYsp4j7/6zWwTxCTT
Malware Config
Signatures
Files
-
f5c43652d6a41a68e12b99930936b7873eb15231a40c567672da84566bb6fa55.exe windows x86
0c3e249ddc964a7ff2423b1de6c0c1b8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetCharWidthA
CreateDCW
GetTextExtentExPointA
SetDIBColorTable
CloseFigure
CreateHalftonePalette
GetOutlineTextMetricsW
GdiFlush
CreateCompatibleBitmap
GetObjectType
CreatePen
EndDoc
CreateBitmap
Ellipse
Arc
GetPixel
BitBlt
ws2_32
WSALookupServiceNextW
WSARecvFrom
WSAResetEvent
WSALookupServiceEnd
inet_addr
WSAAddressToStringW
htonl
ioctlsocket
shutdown
WSAEnumNameSpaceProvidersA
WSACleanup
shell32
Shell_NotifyIconA
SHFileOperationA
SHAddToRecentDocs
FindExecutableA
SHFileOperationW
advapi32
CopySid
NotifyChangeEventLog
CryptExportKey
RegCreateKeyA
CreateProcessAsUserA
CryptCreateHash
ImpersonateNamedPipeClient
BuildSecurityDescriptorW
CryptVerifySignatureA
LookupAccountSidA
CreatePrivateObjectSecurity
GetTokenInformation
PrivilegeCheck
RegSetValueExW
SetThreadToken
ObjectCloseAuditAlarmA
CryptImportKey
InitiateSystemShutdownA
RegDeleteValueW
CryptDecrypt
LookupAccountNameA
RegCreateKeyW
RegGetKeySecurity
RegConnectRegistryW
RegEnumKeyW
IsValidSid
RegOpenKeyW
CryptEncrypt
RegSaveKeyA
EnumDependentServicesW
OpenProcessToken
AccessCheckAndAuditAlarmW
RegCloseKey
RegEnumKeyExW
version
VerInstallFileA
user32
SendInput
LoadBitmapA
AttachThreadInput
CharNextExA
ChangeMenuW
ToUnicode
DialogBoxIndirectParamW
EnumWindowStationsW
GrayStringA
DefDlgProcW
RegisterClipboardFormatA
SetScrollPos
TranslateMessage
GetClassLongW
RegisterWindowMessageW
SetParent
EnumDisplayDevicesA
ValidateRgn
RegisterClassW
EndDeferWindowPos
ScrollWindowEx
ExitWindowsEx
InSendMessage
SetCaretPos
GetNextDlgGroupItem
IsCharLowerW
OpenIcon
MessageBoxExA
GetMessageTime
DrawFrameControl
DestroyCursor
LockWindowUpdate
MessageBeep
CreatePopupMenu
GetMonitorInfoW
DrawTextExW
IsWindowEnabled
kernel32
GetSystemTime
FormatMessageA
WritePrivateProfileStructA
SetConsoleMode
PulseEvent
SystemTimeToFileTime
SetupComm
LoadResource
GetLogicalDriveStringsA
SetEndOfFile
GetModuleHandleA
GetFullPathNameA
FreeLibrary
SetThreadAffinityMask
WritePrivateProfileSectionW
GetFileAttributesA
ReleaseMutex
GlobalReAlloc
LocalAlloc
QueryDosDeviceW
PurgeComm
OpenFile
FlushConsoleInputBuffer
WriteFile
GetTapeParameters
WriteConsoleOutputW
MoveFileExA
CancelIo
ReadConsoleInputW
SetThreadPriorityBoost
GetCurrentProcessId
SetHandleCount
EnumResourceNamesA
SetProcessWorkingSetSize
CreatePipe
IsDBCSLeadByteEx
ExitProcess
GetTempPathW
SetMailslotInfo
VirtualAllocEx
OutputDebugStringA
SetFileTime
SetTimeZoneInformation
FindResourceExA
CreateDirectoryExA
FillConsoleOutputCharacterA
GetConsoleCursorInfo
FormatMessageW
EndUpdateResourceA
GetSystemTimeAsFileTime
ReadConsoleA
LocalLock
VirtualAlloc
lstrlenA
GetPrivateProfileStringW
TryEnterCriticalSection
CreateFileW
ConnectNamedPipe
WaitNamedPipeA
EnumCalendarInfoW
CreateIoCompletionPort
GlobalFindAtomW
RaiseException
LocalReAlloc
GetModuleFileNameW
FindFirstFileW
GetStringTypeExW
FileTimeToLocalFileTime
lstrcmpiA
AreFileApisANSI
GetCommState
FlushFileBuffers
CreateEventA
TlsGetValue
lstrcmpA
SetErrorMode
_llseek
GetProfileIntA
GetDiskFreeSpaceExA
GetSystemDirectoryW
_lread
CreateMutexA
Beep
GetTickCount
GetShortPathNameA
CreateWaitableTimerA
EnumResourceLanguagesW
OutputDebugStringW
GetProcessTimes
SetNamedPipeHandleState
GetAtomNameA
IsValidLocale
FreeResource
DuplicateHandle
GetLocaleInfoW
GetSystemTimeAdjustment
LocalFileTimeToFileTime
GetFileInformationByHandle
OpenMutexA
GetShortPathNameW
IsBadReadPtr
WriteProcessMemory
GetACP
PrepareTape
UnmapViewOfFile
lstrcpyA
SetConsoleOutputCP
ReadDirectoryChangesW
GetLargestConsoleWindowSize
CreateMutexW
GetStartupInfoA
comctl32
ImageList_GetBkColor
ImageList_SetDragCursorImage
ImageList_ReplaceIcon
PropertySheetA
ole32
CoCreateInstance
oleaut32
SafeArrayRedim
SysStringLen
VariantCopy
LoadTypeLibEx
SafeArrayGetLBound
VariantChangeType
SafeArrayGetElement
SysFreeString
QueryPathOfRegTypeLi
SetErrorInfo
SafeArrayUnaccessData
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_mbsnbicmp
iswascii
fscanf
_wpopen
_execlp
__p__environ
isupper
isleadbyte
_isctype
wprintf
_mbsicmp
_mbctolower
wcslen
wcstombs
_spawnvp
_putws
strrchr
strcoll
ceil
_setmode
strpbrk
_wfopen
_read
wcsncpy
_stricoll
fputws
_mbctoupper
_write
iswdigit
abort
_dup2
floor
sprintf
malloc
_vsnwprintf
_pclose
_dup
wcsncmp
wcscpy
_ismbblead
fread
_mbschr
ferror
iswxdigit
_endthreadex
_ecvt
_ismbcspace
_strnicoll
_wsplitpath
_fdopen
_errno
vfwprintf
_fsopen
Sections
.text Size: 200KB - Virtual size: 200KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE