Static task
static1
Behavioral task
behavioral1
Sample
5a06decd3fe7605a5fb1cf143f08c54ca26804283659344261c5d8a3bfabd43c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5a06decd3fe7605a5fb1cf143f08c54ca26804283659344261c5d8a3bfabd43c.exe
Resource
win10v2004-20221111-en
General
-
Target
5a06decd3fe7605a5fb1cf143f08c54ca26804283659344261c5d8a3bfabd43c
-
Size
352KB
-
MD5
7c463319de7377c1cad1b95b414bb1a0
-
SHA1
c50bd8217163b0fde0df5d01198614491a8afb1d
-
SHA256
5a06decd3fe7605a5fb1cf143f08c54ca26804283659344261c5d8a3bfabd43c
-
SHA512
bb7af907acb6cf745a80a36d47797e4317522d0a6a1a59e66072342a2e2dcaa0e4fd1f51f08ba76f1a84ddbf31f57107d8702264afff17eb4ee4100540e8d352
-
SSDEEP
6144:ZIv6INC/dfOBO4uR5kIcOhfZsm6+A1pl08V68nraCR+7oP:ZIv6INC/dfW67lc+fZ16F7taK+7oP
Malware Config
Signatures
Files
-
5a06decd3fe7605a5fb1cf143f08c54ca26804283659344261c5d8a3bfabd43c.exe windows x86
128d74ac8c1c0c8ae334cb198ba597c6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
RegisterClassExA
CallWindowProcW
LoadCursorFromFileW
RegisterClassA
AppendMenuW
CheckDlgButton
CharLowerBuffA
DrawTextA
CharNextA
MapVirtualKeyExA
CharUpperBuffW
EmptyClipboard
MsgWaitForMultipleObjectsEx
GetNextDlgTabItem
MapVirtualKeyW
EnumDisplaySettingsExA
ShowWindow
CallWindowProcA
RemovePropW
MessageBoxA
MonitorFromRect
LoadBitmapA
GetForegroundWindow
DestroyWindow
GetWindowModuleFileNameW
OemToCharBuffW
DdeQueryConvInfo
CreateIconIndirect
SetMessageQueue
SwapMouseButton
DlgDirListComboBoxW
CreateWindowExA
DefWindowProcW
IsDialogMessage
GetWindowModuleFileNameA
comctl32
DrawStatusText
ImageList_SetOverlayImage
ImageList_SetImageCount
MakeDragList
DrawStatusTextA
CreateToolbar
ImageList_LoadImageA
ImageList_EndDrag
ImageList_GetIconSize
ImageList_Create
ImageList_GetIcon
CreatePropertySheetPage
ImageList_BeginDrag
ImageList_AddIcon
ImageList_LoadImageW
InitCommonControlsEx
ImageList_ReplaceIcon
ImageList_Read
ImageList_Destroy
CreatePropertySheetPageA
ImageList_SetIconSize
ImageList_Merge
DrawStatusTextW
ImageList_SetFilter
kernel32
ReadFile
GetLocaleInfoW
GetTimeFormatA
LCMapStringA
GetStartupInfoA
lstrlenA
GetCommandLineA
GetEnvironmentStringsW
GetLocalTime
GetMailslotInfo
GetLocaleInfoA
GetCommandLineW
HeapSize
VirtualAlloc
GetFullPathNameA
HeapCreate
GetProcAddress
SetLastError
VirtualFree
LocalSize
GetSystemTimeAsFileTime
GetCurrentThread
GetModuleFileNameA
GetPrivateProfileIntA
GetThreadLocale
LoadLibraryExW
SetHandleCount
InitializeCriticalSection
GetDriveTypeA
CreateEventW
GetModuleHandleA
CloseHandle
DeleteCriticalSection
EnumSystemLocalesA
SystemTimeToFileTime
GetModuleFileNameW
CreateMutexA
LoadLibraryA
QueryPerformanceCounter
WriteFile
LoadLibraryW
GetStringTypeW
GetStdHandle
OpenMutexA
GetLogicalDriveStringsA
VirtualQuery
EnterCriticalSection
LeaveCriticalSection
WideCharToMultiByte
lstrcpy
GetLastError
FreeEnvironmentStringsA
InterlockedExchange
GetCurrentProcessId
IsValidCodePage
HeapDestroy
GetTimeZoneInformation
GetOEMCP
MultiByteToWideChar
GetACP
RtlUnwind
GetThreadPriorityBoost
TlsAlloc
GetTickCount
GetDateFormatA
SetFilePointer
HeapAlloc
SetStdHandle
FlushFileBuffers
TlsSetValue
DeleteFileA
TerminateProcess
IsValidLocale
CompareStringW
GetStartupInfoW
GetCurrentProcess
HeapReAlloc
GetUserDefaultLCID
VirtualFreeEx
LCMapStringW
GetFileType
GetSystemInfo
GetCPInfo
IsBadWritePtr
SetEnvironmentVariableA
TlsGetValue
GetCurrentThreadId
EnumResourceLanguagesA
CreateWaitableTimerA
GetVersionExA
SetCriticalSectionSpinCount
CompareStringA
VirtualProtect
ExitProcess
TlsFree
GetEnvironmentStrings
GetFullPathNameW
HeapFree
FreeEnvironmentStringsW
UnhandledExceptionFilter
GetStringTypeA
Sections
.text Size: 140KB - Virtual size: 139KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ