Static task
static1
Behavioral task
behavioral1
Sample
c4472450246f61b1e281850bee1281f2131261bf735ea918054681067592b187.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c4472450246f61b1e281850bee1281f2131261bf735ea918054681067592b187.exe
Resource
win10v2004-20220812-en
General
-
Target
c4472450246f61b1e281850bee1281f2131261bf735ea918054681067592b187
-
Size
293KB
-
MD5
91e38718ccf7d316eb701286460bbc40
-
SHA1
05ced07cf61a113f004abe77587d9d7ba733ebbe
-
SHA256
c4472450246f61b1e281850bee1281f2131261bf735ea918054681067592b187
-
SHA512
9d4aad1b93eca46cedd81fa0bde5a5772c3deaa49b754d5afafa988c38a9dc5505b5ed8e94e364ccaf4f71735d759a90fbacf6458d2094055f316cbed905db1f
-
SSDEEP
6144:lvn8aJhCrf3MsOBnUw5XfzCuMZ4Pe4/hjtaZrYb26:lvnfJhCrfhWh2ke4/hIu
Malware Config
Signatures
Files
-
c4472450246f61b1e281850bee1281f2131261bf735ea918054681067592b187.exe windows x86
3624d91edf212b183a168797e2d25c37
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetSysColor
KillTimer
DestroyIcon
DestroyWindow
PostQuitMessage
GetClientRect
MoveWindow
GetSystemMenu
SetTimer
SetWindowPlacement
InsertMenuItemA
GetMenu
CheckMenuItem
SetMenuItemInfoA
SetActiveWindow
DefDlgProcA
RegisterClassA
EndDialog
SetDlgItemTextA
EnumClipboardFormats
GetClipboardData
CloseClipboard
GetClassInfoA
CallWindowProcA
SetWindowLongA
IsDlgButtonChecked
SetWindowTextA
CheckDlgButton
GetActiveWindow
MessageBoxA
wsprintfA
GetDlgItemTextA
SendMessageA
GetCursorPos
TrackPopupMenu
ClientToScreen
DestroyMenu
CreatePopupMenu
AppendMenuA
SendDlgItemMessageA
GetDlgItem
LoadCursorA
gdi32
GetStockObject
DeleteObject
SetBkMode
SetTextColor
CreateFontIndirectA
SelectObject
GetObjectA
opengl32
glTexCoord1s
glNormal3dv
glVertex2f
glRasterPos4s
glGetFloatv
glGetTexEnviv
wglUseFontBitmapsA
glTexCoord1i
kernel32
GetConsoleMode
GetConsoleCP
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
GetCurrentProcessId
QueryPerformanceCounter
DeleteCriticalSection
IsDebuggerPresent
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleW
IsValidCodePage
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
EnterCriticalSection
lstrcatA
HeapAlloc
GetProcessHeap
HeapFree
ExitThread
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FreeEnvironmentStringsW
Sleep
CreateThread
VirtualAlloc
VirtualFree
GetProcAddress
OpenProcess
IsBadStringPtrA
IsBadReadPtr
lstrcmpA
lstrlenW
SetSystemPowerState
GetLastError
ResumeThread
GetEnvironmentVariableW
FatalExit
EnumDateFormatsW
GetSystemDirectoryA
GetPriorityClass
GetVersion
lstrlenA
lstrcpyA
lstrcpynA
GetFileAttributesA
FindClose
FindFirstFileA
ReadFile
GetTempFileNameA
GetTickCount
GetTempPathA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
TerminateProcess
OutputDebugStringA
ReadProcessMemory
GetCurrentDirectoryA
VirtualProtectEx
CreateProcessA
CloseHandle
WriteFile
CreateFileA
GetModuleHandleA
lstrcmpiA
RtlUnwind
GetStartupInfoA
GetCommandLineA
MultiByteToWideChar
LCMapStringA
LCMapStringW
HeapSize
GetCPInfo
GetACP
GetOEMCP
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
SetUnhandledExceptionFilter
IsBadWritePtr
IsBadCodePtr
GetStringTypeA
GetStringTypeW
SetStdHandle
WideCharToMultiByte
GetPrivateProfileStructA
WritePrivateProfileStructA
VirtualQueryEx
HeapReAlloc
FreeLibrary
LoadLibraryA
FindNextFileA
FileTimeToSystemTime
CopyFileA
SetFileAttributesA
LocalAlloc
TerminateThread
SetPriorityClass
GetCurrentProcess
WriteProcessMemory
SetCurrentDirectoryA
GetLocalTime
DeleteFileA
ExitProcess
SetProcessShutdownParameters
LocalFree
SetEndOfFile
FlushViewOfFile
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
DeviceIoControl
FlushFileBuffers
GlobalReAlloc
GetSystemTimeAsFileTime
GlobalMemoryStatus
FileTimeToLocalFileTime
FileTimeToDosDateTime
GetFileSize
GetFileTime
GetSystemInfo
GetModuleFileNameA
SetFilePointer
VirtualQuery
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 213KB - Virtual size: 213KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ