Static task
static1
Behavioral task
behavioral1
Sample
75add4dfa9396c1140f3c8b292ce16ae4d78492c8a7e44e3a9ba3bfcde2f56d4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
75add4dfa9396c1140f3c8b292ce16ae4d78492c8a7e44e3a9ba3bfcde2f56d4.exe
Resource
win10v2004-20220812-en
General
-
Target
75add4dfa9396c1140f3c8b292ce16ae4d78492c8a7e44e3a9ba3bfcde2f56d4
-
Size
866KB
-
MD5
2e5a39186183faa1f5f9e562bb94b8de
-
SHA1
d0dafeac978326cad06332ac908d1b1e9d2e419c
-
SHA256
75add4dfa9396c1140f3c8b292ce16ae4d78492c8a7e44e3a9ba3bfcde2f56d4
-
SHA512
55896401dd1d3950b678456194987581884bf7aa7e2a35676ca260e81bf35a16b24691422fdb4de7c526ff1d3a7258d30ef30c198130b57020cee1ca6fa4fd60
-
SSDEEP
24576:Ln6oNSVWnRU3glVTxioQ5CG+8bftfFVeouO:moNSp3QtioI+8NeG
Malware Config
Signatures
Files
-
75add4dfa9396c1140f3c8b292ce16ae4d78492c8a7e44e3a9ba3bfcde2f56d4.exe windows x86
528ed3a9b6c1929e11f0c72fe4ea1922
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SendDlgItemMessageA
LoadStringA
CharNextA
DialogBoxParamA
IsCharAlphaA
CharNextExA
GetDesktopWindow
GetDlgItemTextA
KillTimer
EnableWindow
SetTimer
PostMessageA
SetFocus
CreateDialogParamA
DestroyWindow
GetDlgItem
GetDC
ReleaseDC
ScreenToClient
SetWindowLongA
CreateWindowExA
GetWindowRect
SystemParametersInfoA
MessageBeep
PeekMessageA
GetSysColor
GetClassNameA
MessageBoxA
DispatchMessageA
MapWindowPoints
GetClientRect
shell32
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
gdi32
TextOutA
SetTextColor
SelectObject
SetBkMode
GetTextExtentPointA
GetDeviceCaps
GetObjectA
DeleteObject
CreateFontIndirectA
comctl32
PropertySheetA
kernel32
GetLocaleInfoA
WriteConsoleA
GetTickCount
LoadLibraryA
DeleteCriticalSection
GetModuleFileNameA
WriteFile
ExitProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
GetLastError
GetConsoleOutputCP
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapReAlloc
SetFilePointer
GetConsoleCP
GetConsoleMode
RaiseException
HeapSize
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
VirtualAlloc
LocalUnlock
GetTimeFormatW
SetCommState
GetUserDefaultUILanguage
GetDateFormatA
GetPrivateProfileStringW
lstrcpyW
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
GetModuleHandleA
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
WideCharToMultiByte
GetStringTypeA
GetStringTypeW
MultiByteToWideChar
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetCPInfo
GetACP
GetOEMCP
SetHandleCount
GetStdHandle
CloseHandle
SetStdHandle
GetFileType
RtlUnwind
LCMapStringA
LCMapStringW
FlushFileBuffers
lstrcpynA
CompareStringA
FindResourceA
lstrlenA
lstrcpyA
FindClose
FindFirstFileA
GetDiskFreeSpaceA
Sleep
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
CreateFileA
GetFileAttributesA
lstrcatA
GetStartupInfoA
EnterCriticalSection
LeaveCriticalSection
InterlockedIncrement
InterlockedDecrement
IsValidCodePage
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
Sections
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pe Size: 128KB - Virtual size: 46.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 709KB - Virtual size: 709KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ