Static task
static1
Behavioral task
behavioral1
Sample
8421646a4c19ceb74b5bd6504c2f8257e080272484f243494ec6874217414398.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8421646a4c19ceb74b5bd6504c2f8257e080272484f243494ec6874217414398.exe
Resource
win10v2004-20221111-en
General
-
Target
8421646a4c19ceb74b5bd6504c2f8257e080272484f243494ec6874217414398
-
Size
588KB
-
MD5
899062b5886bc931e0f497695f7cdf3c
-
SHA1
e81569a607f9a39386a15138bda9753241001a5b
-
SHA256
8421646a4c19ceb74b5bd6504c2f8257e080272484f243494ec6874217414398
-
SHA512
3ff023f3effe463ea31aa1d3a49126884d358e9142cb4b5e37c1875e92959e5bcd09a084e5dd87df356d6ee1809019d5b9c752bf26e72962781198ef91982930
-
SSDEEP
12288:LMDk+IHBepzEU0sX42iwZB3edy2chlL0dUapcoJVXj:gDk+8eZ0S3edyv0eoJ
Malware Config
Signatures
Files
-
8421646a4c19ceb74b5bd6504c2f8257e080272484f243494ec6874217414398.exe windows x86
babb3c8a29ce3ee6c721922485559eec
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_GetImageCount
ImageList_BeginDrag
ImageList_SetFlags
ImageList_GetImageRect
ImageList_SetIconSize
ImageList_DragShowNolock
ImageList_DragEnter
CreatePropertySheetPageA
CreateStatusWindowW
ImageList_AddMasked
ImageList_Write
ImageList_DragLeave
InitCommonControlsEx
CreateToolbar
DrawStatusTextW
CreateStatusWindow
ImageList_Read
ImageList_GetImageInfo
comdlg32
GetOpenFileNameA
FindTextA
PrintDlgW
GetSaveFileNameA
advapi32
CryptSetProviderExW
CryptCreateHash
RegQueryValueA
CryptEnumProvidersW
RegDeleteKeyW
CryptGetDefaultProviderW
DuplicateToken
RegNotifyChangeKeyValue
CryptSetHashParam
CryptSetProvParam
LookupPrivilegeNameW
RegDeleteValueW
RegSetValueExA
CreateServiceA
RegCreateKeyExW
InitiateSystemShutdownA
StartServiceW
user32
SetWindowsHookExW
GetAncestor
DestroyMenu
DrawIconEx
RegisterClipboardFormatA
ChangeMenuA
IsCharAlphaW
UnregisterHotKey
GetKeyNameTextA
GetTitleBarInfo
TrackPopupMenuEx
CopyRect
GetKeyboardType
GetUpdateRgn
LookupIconIdFromDirectory
MessageBoxA
CreateWindowExA
SetMenuItemInfoA
CharUpperW
GetProcessDefaultLayout
ShowCursor
GetMonitorInfoW
DdeUninitialize
OpenDesktopW
DrawIcon
DdeCreateStringHandleW
GetPropW
EqualRect
ClientToScreen
CharToOemBuffA
EnumPropsW
GetKeyNameTextW
ScrollDC
UnregisterDeviceNotification
GetLastActivePopup
RegisterClassA
GetMonitorInfoA
RegisterClassExA
SetClassLongA
CheckDlgButton
GetProcessWindowStation
CreatePopupMenu
ChangeClipboardChain
GetMenuContextHelpId
SetCapture
SetDlgItemInt
CreateIconFromResourceEx
PostQuitMessage
DlgDirSelectComboBoxExA
DdeQueryStringA
MonitorFromWindow
DdeAccessData
DdeQueryStringW
SetMenuItemBitmaps
GetMessageA
ExcludeUpdateRgn
GetForegroundWindow
CountClipboardFormats
DlgDirListW
ShowCaret
OemToCharBuffA
SetDeskWallpaper
DefWindowProcA
GetMenuInfo
DdeFreeDataHandle
LoadCursorFromFileA
GetThreadDesktop
kernel32
IsValidLocale
OpenMutexA
SetFilePointer
GetLocaleInfoW
GetStartupInfoW
GetFullPathNameW
GetPrivateProfileSectionA
FlushFileBuffers
GetACP
FreeEnvironmentStringsW
GetCurrentThreadId
WaitNamedPipeA
GetStdHandle
CreateMailslotW
GetTickCount
GetSystemDefaultLCID
FileTimeToDosDateTime
GetConsoleTitleW
VirtualFree
QueryPerformanceCounter
GlobalReAlloc
GetDateFormatA
ReadConsoleOutputCharacterW
FlushInstructionCache
CompareStringA
VirtualProtectEx
IsBadWritePtr
GetUserDefaultLCID
GetCurrentThread
HeapAlloc
GetCurrentProcessId
HeapCreate
GlobalFindAtomW
MultiByteToWideChar
GetCommandLineA
RtlUnwind
HeapSize
VirtualProtect
FindFirstFileExW
WaitForSingleObjectEx
HeapReAlloc
GetSystemTimeAdjustment
TlsSetValue
WriteFile
WideCharToMultiByte
GetModuleFileNameA
GetSystemTimeAsFileTime
SetStdHandle
lstrcatA
HeapFree
GetSystemTime
ExitProcess
GetVersionExA
GlobalFree
GetCurrentProcess
SetEnvironmentVariableA
GetEnvironmentStringsW
SetVolumeLabelW
TlsAlloc
GetSystemInfo
TlsFree
TlsGetValue
EnterCriticalSection
DosDateTimeToFileTime
CloseHandle
GetCompressedFileSizeW
FreeEnvironmentStringsA
FreeResource
GetEnvironmentStrings
ReadFile
TerminateProcess
GetStringTypeW
GetTimeFormatA
GetCalendarInfoW
LeaveCriticalSection
GetStartupInfoA
DeleteCriticalSection
SetLastError
GetStringTypeA
SetHandleCount
GetProcAddress
DuplicateHandle
CreateMutexA
CreateToolhelp32Snapshot
GetCPInfo
UnhandledExceptionFilter
WritePrivateProfileStructA
VirtualAlloc
GetCurrentDirectoryA
EnumDateFormatsExA
GetLastError
LCMapStringW
IsValidCodePage
HeapDestroy
CreateWaitableTimerW
OpenFileMappingA
GetModuleHandleA
SetTimeZoneInformation
CompareStringW
GetTimeZoneInformation
MoveFileExA
LCMapStringA
RtlMoveMemory
GetThreadSelectorEntry
CreateFileMappingA
GetFileType
InitializeCriticalSection
GetLocaleInfoA
GetProcessHeap
LocalHandle
EnumSystemLocalesA
SetConsoleScreenBufferSize
SetEvent
LoadLibraryA
OpenSemaphoreA
VirtualQuery
InterlockedExchange
GetOEMCP
Sections
.text Size: 196KB - Virtual size: 193KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 260KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ