Static task
static1
Behavioral task
behavioral1
Sample
56ed0ef12ec8227e7648a7c3dfd7e09777eaf7147beb0baa1479f5d7f8670e5d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
56ed0ef12ec8227e7648a7c3dfd7e09777eaf7147beb0baa1479f5d7f8670e5d.exe
Resource
win10v2004-20221111-en
General
-
Target
56ed0ef12ec8227e7648a7c3dfd7e09777eaf7147beb0baa1479f5d7f8670e5d
-
Size
572KB
-
MD5
2fa91662885fe0dbcea6afde43120704
-
SHA1
584b9f84acd6d1f51a583ee92442056b0c4cc2bb
-
SHA256
56ed0ef12ec8227e7648a7c3dfd7e09777eaf7147beb0baa1479f5d7f8670e5d
-
SHA512
6d6c69e95ce3f7d20fb2216f133b705ed8ddbe63e37cc33f4d1e89e7b572d91c1f19b475b35f5d52ba5d50ef686b98fed65452001afd249c02888d5dbf45aa4e
-
SSDEEP
12288:GwlRMk2f4pHz5+2/HEpI3ve2tiUjszzbGkZX:HlRMk2fi3/Ep8vZKakl
Malware Config
Signatures
Files
-
56ed0ef12ec8227e7648a7c3dfd7e09777eaf7147beb0baa1479f5d7f8670e5d.exe windows x86
542efcfee841699fb051a886e076ce86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
CreateUpDownControl
ImageList_Destroy
InitCommonControlsEx
_TrackMouseEvent
ImageList_GetIconSize
CreateMappedBitmap
DrawStatusTextW
ImageList_Copy
ImageList_Add
MakeDragList
ImageList_Replace
ImageList_DragMove
ImageList_AddIcon
ImageList_LoadImageA
CreateStatusWindowW
ImageList_SetIconSize
DestroyPropertySheetPage
wininet
InternetUnlockRequestFile
FtpFindFirstFileW
InternetDialA
FtpGetFileA
InternetTimeFromSystemTimeA
FindFirstUrlCacheEntryW
InternetSetDialState
FtpDeleteFileA
GopherGetLocatorTypeW
user32
LoadCursorW
CallMsgFilter
DdeQueryStringA
BeginPaint
SetWindowTextW
DdeQueryStringW
UnhookWindowsHook
ChildWindowFromPointEx
DefWindowProcA
OpenClipboard
PostQuitMessage
MapVirtualKeyExW
OemKeyScan
GetClassLongA
RegisterClassA
EnumThreadWindows
AttachThreadInput
IsIconic
GetMenuBarInfo
DrawFocusRect
SetPropA
GetUpdateRect
CharToOemBuffW
WINNLSGetEnableStatus
InvalidateRect
SetDeskWallpaper
DlgDirSelectExA
SetDlgItemTextA
GetAsyncKeyState
MessageBoxIndirectA
GetKeyNameTextW
GetCaretPos
ArrangeIconicWindows
GetMenuItemRect
MessageBoxA
GetSubMenu
wvsprintfW
GetForegroundWindow
GetUpdateRgn
InvertRect
DlgDirSelectComboBoxExW
RealChildWindowFromPoint
SetWindowsHookA
CheckMenuItem
IsCharAlphaNumericA
WINNLSEnableIME
SendDlgItemMessageW
ToUnicode
MessageBoxW
CreateWindowExA
ShowCaret
DefDlgProcW
SendMessageTimeoutA
EnumDisplayDevicesW
DrawTextW
DdeGetData
ShowWindow
GetClassInfoExA
SetActiveWindow
GetIconInfo
FindWindowExA
DestroyIcon
GetMessagePos
CloseDesktop
DestroyWindow
BeginDeferWindowPos
CopyIcon
RegisterClassExA
OpenInputDesktop
kernel32
GetCommandLineA
GetTimeZoneInformation
IsBadWritePtr
FlushFileBuffers
FreeEnvironmentStringsA
GetCPInfo
VirtualQuery
GetDateFormatW
GetModuleFileNameW
GetTickCount
GetStringTypeW
GetModuleHandleA
GetVersion
FindAtomW
HeapAlloc
CreateMailslotW
GetLocalTime
SetEnvironmentVariableW
RtlUnwind
TlsSetValue
GetSystemTimeAsFileTime
GetStartupInfoA
TerminateProcess
SetFilePointer
GetEnvironmentStrings
GetStdHandle
ReadFile
GetCommandLineW
GetCurrentThread
CloseHandle
FindResourceExW
InterlockedIncrement
LoadLibraryExW
LeaveCriticalSection
TlsGetValue
MultiByteToWideChar
GetEnvironmentStringsW
UnhandledExceptionFilter
WideCharToMultiByte
GetThreadPriority
LCMapStringA
GetProcAddress
GetLastError
WriteFile
CreateDirectoryA
WaitForMultipleObjectsEx
FreeEnvironmentStringsW
DeleteCriticalSection
TlsFree
InterlockedDecrement
QueryPerformanceCounter
EnumSystemCodePagesW
LCMapStringW
CompareStringW
SetConsoleScreenBufferSize
InitializeCriticalSection
HeapReAlloc
GetStartupInfoW
OpenMutexA
GetCurrentProcessId
SetStdHandle
GetModuleFileNameA
ExitProcess
SetHandleCount
GetSystemTime
SetConsoleTextAttribute
CreateDirectoryW
GetCurrentThreadId
GetCurrentProcess
SetPriorityClass
SetLastError
GetStringTypeA
VirtualAlloc
HeapDestroy
VirtualFree
GetFileType
HeapCreate
SetEnvironmentVariableA
HeapFree
InterlockedExchange
GetFileAttributesA
TlsAlloc
EnterCriticalSection
LoadLibraryA
SetFileAttributesA
CompareStringA
CreateMutexA
shell32
DragQueryFile
SHGetDesktopFolder
SHGetFileInfoW
ExtractIconEx
SHFileOperation
Sections
.text Size: 192KB - Virtual size: 190KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 248KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ