Static task
static1
Behavioral task
behavioral1
Sample
805f85548eb54c0e57b9c8315b31312e0cc4908f2ff996e7b5827f3fc55d24f9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
805f85548eb54c0e57b9c8315b31312e0cc4908f2ff996e7b5827f3fc55d24f9.exe
Resource
win10v2004-20220812-en
General
-
Target
805f85548eb54c0e57b9c8315b31312e0cc4908f2ff996e7b5827f3fc55d24f9
-
Size
103KB
-
MD5
ec1bd86468ea3c151b38f4a47cc1bb91
-
SHA1
f4b0ffc06c024b5f1b670cfcfd8a8a090d285900
-
SHA256
805f85548eb54c0e57b9c8315b31312e0cc4908f2ff996e7b5827f3fc55d24f9
-
SHA512
e5e308d01c6b33548ffcb7dfa338e632cb9d2404514636b223faa3742eb8687d649357f820cb405c00008bd225520f41c5e8e39baf74848cf89c20c0bf367773
-
SSDEEP
1536:4qUazAxT9RkWrbCJC+uo2xgiBpPIEZb0by+CbwtXnO/l4oSJUBieEh1JT+:Sowk2xlpPIwb6yRbmnjJUd2+
Malware Config
Signatures
Files
-
805f85548eb54c0e57b9c8315b31312e0cc4908f2ff996e7b5827f3fc55d24f9.exe windows x86
c8a42105c200e04a4ca511f02f2fda0c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowRect
EndPaint
DrawTextA
FillRect
GetClientRect
EndDialog
ScreenToClient
ShowWindow
EnableMenuItem
BeginPaint
shell32
SHGetSpecialFolderLocation
SHFileOperationA
ShellExecuteA
SHGetFileInfoA
SHBrowseForFolderA
SHGetPathFromIDListA
ole32
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
advapi32
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegCreateKeyExA
gdi32
SetTextColor
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SelectObject
opengl32
glDisable
glGetMaterialiv
glTexCoord2i
glStencilFunc
glColor3s
glIsEnabled
glRasterPos2i
glColor3dv
comctl32
ImageList_Destroy
ImageList_AddMasked
ImageList_Create
kernel32
HeapAlloc
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapSize
WriteConsoleA
GetConsoleOutputCP
InitializeCriticalSectionAndSpinCount
LoadLibraryA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetCurrentProcessId
HeapFree
HeapCreate
WriteConsoleW
GetCommandLineA
DefineDosDeviceW
SetStdHandle
GlobalMemoryStatusEx
GlobalUnWire
GetCurrencyFormatW
SetLastError
CloseHandle
CreateFileA
GetFileType
GetFileSize
GetStdHandle
RaiseException
ReadFile
RtlUnwind
SetEndOfFile
SetFilePointer
UnhandledExceptionFilter
WriteFile
CompareStringA
ExitProcess
FindClose
FindFirstFileA
FreeLibrary
GetCurrentDirectoryA
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetThreadLocale
LoadLibraryExA
lstrcpynA
lstrlenA
MultiByteToWideChar
SetCurrentDirectoryA
WideCharToMultiByte
VirtualQuery
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
VirtualAlloc
VirtualFree
Sleep
GetACP
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
DeleteCriticalSection
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ