Static task
static1
Behavioral task
behavioral1
Sample
c0217a983d256993e3885f64f9c823cb378b6e24544bc9ab94da2a8b570b9f6f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c0217a983d256993e3885f64f9c823cb378b6e24544bc9ab94da2a8b570b9f6f.exe
Resource
win10v2004-20220812-en
General
-
Target
c0217a983d256993e3885f64f9c823cb378b6e24544bc9ab94da2a8b570b9f6f
-
Size
800KB
-
MD5
4f8f8a6e8928403a4e0fab5f0621d1cb
-
SHA1
2a170a6dc27ccd5d9ec887c7e93b1cc321ab5ee9
-
SHA256
c0217a983d256993e3885f64f9c823cb378b6e24544bc9ab94da2a8b570b9f6f
-
SHA512
1c6850c724ba83031197d9519ef7e13ed279080e61aefde36051965132a3b0fb36b9da260e3542d23f87364bc674c07cda57caabeb71b83900c0464656eb2f40
-
SSDEEP
24576:Hipa6qbhGsmn0avp/hs7i3/g2OlK28Whdb:Cp1g4n0ABZ/daKhW7
Malware Config
Signatures
Files
-
c0217a983d256993e3885f64f9c823cb378b6e24544bc9ab94da2a8b570b9f6f.exe windows x86
97a24a62f9473a85be4acdd150fc6358
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
ChooseFontA
FindTextW
user32
RegisterClassExA
IsDialogMessageW
SetWindowRgn
ChildWindowFromPoint
IsCharAlphaNumericA
CheckDlgButton
RegisterClassA
DefFrameProcA
DdeSetQualityOfService
DrawFrameControl
MessageBoxA
GetClassInfoA
GetClipboardFormatNameA
GetWindowInfo
DlgDirSelectComboBoxExW
GetMessageW
FindWindowExA
DialogBoxIndirectParamW
GetWindowTextLengthA
DestroyCursor
PostThreadMessageW
AdjustWindowRectEx
SetDlgItemTextA
WaitMessage
DefWindowProcA
DestroyWindow
GetWindowLongW
GetMonitorInfoA
SetWindowTextA
AppendMenuW
DdeGetLastError
CharToOemBuffA
ShowScrollBar
CreateMDIWindowA
GetKeyboardState
EndMenu
DdeCmpStringHandles
CreateWindowExW
GetDlgItemInt
ToUnicodeEx
ShowWindow
comctl32
ImageList_LoadImage
ImageList_DrawIndirect
ImageList_Duplicate
ImageList_SetDragCursorImage
InitCommonControlsEx
CreatePropertySheetPageW
ImageList_Destroy
kernel32
Sleep
InterlockedExchange
TerminateProcess
GetCurrencyFormatA
UnhandledExceptionFilter
LeaveCriticalSection
GetLogicalDrives
LockFileEx
TlsFree
GetCurrentThread
WideCharToMultiByte
InterlockedDecrement
LCMapStringA
ExpandEnvironmentStringsA
SetConsoleCtrlHandler
SetUnhandledExceptionFilter
GetModuleHandleA
GetProcAddress
CreateFileA
LCMapStringW
HeapFree
VirtualProtectEx
SetLocaleInfoW
LocalFlags
IsValidLocale
FlushFileBuffers
InterlockedIncrement
GetCommandLineA
GetModuleFileNameW
GlobalFindAtomA
GetFileType
EnumSystemLocalesA
GetStringTypeW
RtlUnwind
SetLastError
VirtualAlloc
GetNumberFormatW
WriteConsoleW
GetCommandLineW
VirtualFree
GetCurrentThreadId
GetModuleFileNameA
GetDateFormatA
RaiseException
CloseHandle
GetLastError
LoadLibraryA
GetEnvironmentStringsW
ReadConsoleOutputW
QueryPerformanceCounter
GetCurrentProcess
CompareStringW
GetStdHandle
GetVersionExA
GetComputerNameA
GetFileAttributesExW
GetCPInfo
ExitThread
GetConsoleMode
TlsAlloc
HeapSize
OpenMutexA
GetTimeFormatA
MultiByteToWideChar
GetLocaleInfoA
DeleteCriticalSection
GetProcessAffinityMask
GetOEMCP
EnterCriticalSection
GetUserDefaultLCID
VirtualQuery
SetFilePointer
FreeEnvironmentStringsA
GetStringTypeA
WriteFile
FormatMessageW
VirtualLock
HeapAlloc
SetHandleCount
ReadFile
GetSystemTime
GetConsoleCP
CreateMutexA
GetSystemTimeAsFileTime
TlsSetValue
HeapReAlloc
TlsGetValue
GetTickCount
SetStdHandle
GetLocaleInfoW
GetCurrentProcessId
GetConsoleOutputCP
HeapLock
HeapCreate
InitializeCriticalSection
CompareStringA
HeapDestroy
GetStartupInfoA
GetEnvironmentStrings
ExitProcess
GetTimeZoneInformation
FreeEnvironmentStringsW
FreeLibrary
IsDebuggerPresent
GlobalUnlock
lstrcpyn
IsValidCodePage
WriteConsoleA
GetStartupInfoW
GetLogicalDriveStringsW
GetProcessHeap
GetExitCodeThread
GetACP
SetEnvironmentVariableA
Sections
.text Size: 208KB - Virtual size: 205KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 400KB - Virtual size: 397KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 144KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ