Static task
static1
Behavioral task
behavioral1
Sample
b50a324ed3240bf5dbd48d02a2d8926e2ce82246e4bd39cb7643f97afde04885.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b50a324ed3240bf5dbd48d02a2d8926e2ce82246e4bd39cb7643f97afde04885.exe
Resource
win10v2004-20220901-en
General
-
Target
b50a324ed3240bf5dbd48d02a2d8926e2ce82246e4bd39cb7643f97afde04885
-
Size
1.1MB
-
MD5
af6fcc51224d0a988531fed061dca0b3
-
SHA1
0e50a7bde3a4cb0ce39ee47a25eb7203386af236
-
SHA256
b50a324ed3240bf5dbd48d02a2d8926e2ce82246e4bd39cb7643f97afde04885
-
SHA512
6426fda99009b3f77cb1f97f31507d7cb9126edf010018c18a9d55bea150c19fbbce61dd4ab38fc4cd4ead27057cd7051912ff93c5bc9c8d42f1b0243d70d429
-
SSDEEP
6144:NMtipohjpRsrj7HQH0/huEtZ6ZlZrADLzZJLe2EfLNJx5TZBtBBhxTJh5Vzd551X:NVwEUk9gk4VTCp9qWF6nJnSSqmD9
Malware Config
Signatures
Files
-
b50a324ed3240bf5dbd48d02a2d8926e2ce82246e4bd39cb7643f97afde04885.exe windows x86
2c5a9e5b85899be204bdfc27a71fe24a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
GetTimeFormatA
GetTimeFormatW
GetUserDefaultLCID
GetVersionExA
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsBadReadPtr
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
LocalAlloc
LocalFree
GetSystemTimeAsFileTime
MultiByteToWideChar
QueryPerformanceCounter
SetEnvironmentVariableW
SetEvent
SetLastError
SetUnhandledExceptionFilter
TerminateProcess
TerminateThread
UnhandledExceptionFilter
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
lstrcpynA
lstrlenA
GetSystemDefaultLangID
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetLastError
GetDateFormatW
GetDateFormatA
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
FreeLibrary
FormatMessageW
FormatMessageA
FileTimeToSystemTime
FileTimeToLocalFileTime
EnterCriticalSection
DuplicateHandle
DeleteCriticalSection
CreateThread
CreateEventW
CreateEventA
CloseHandle
AreFileApisANSI
VirtualAllocEx
GetDriveTypeA
GetModuleHandleW
LocalReAlloc
user32
GetDC
GetDlgItem
GetFocus
GetMessageA
GetParent
GetProcessWindowStation
GetSystemMetrics
GetThreadDesktop
GetUserObjectInformationW
GetWindowLongA
GetWindowRect
InvalidateRect
IsDialogMessageA
IsWindowEnabled
IsWindowVisible
KillTimer
LoadIconA
LoadStringA
LoadStringW
MapWindowPoints
MessageBoxA
MessageBoxW
MsgWaitForMultipleObjects
PeekMessageA
PostMessageA
PostQuitMessage
RedrawWindow
RegisterClassA
RegisterClassW
RegisterWindowMessageA
RegisterWindowMessageW
ReleaseDC
SendMessageA
SendMessageW
SetCursor
SetFocus
SetForegroundWindow
SetRect
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
SetWindowTextW
ShowWindow
SystemParametersInfoA
TranslateMessage
UpdateWindow
WinHelpA
WinHelpW
wsprintfW
GetClientRect
FindWindowW
FindWindowExW
FindWindowA
FillRect
EndPaint
EnableWindow
DrawTextW
DrawTextA
DrawIcon
DrawFocusRect
DrawAnimatedRects
DispatchMessageA
DestroyWindow
DefWindowProcW
DefWindowProcA
DefDlgProcW
DefDlgProcA
CreateWindowExW
CreateWindowExA
CreateDialogParamW
CreateDialogParamA
CallWindowProcW
BeginPaint
AttachThreadInput
GetSysColor
LoadCursorA
FindWindowExA
gdi32
SetTextColor
SetBkColor
SelectObject
SaveDC
RestoreDC
GetTextExtentPointW
GetTextExtentPointA
GetObjectA
DeleteObject
CreateFontIndirectW
CreateFontIndirectA
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyExW
RegEnumKeyW
RegEnumKeyA
RegCreateKeyExW
RegCreateKeyExA
RegCloseKey
OpenThreadToken
OpenProcessToken
GetUserNameW
RegOpenKeyExA
RegQueryValueExW
GetUserNameA
RegSetValueExW
ole32
StringFromGUID2
CoUninitialize
CoTaskMemFree
CoRevokeClassObject
CoRegisterClassObject
CoInitializeEx
CoInitialize
CoFreeUnusedLibraries
CoCreateInstance
CLSIDFromString
msvcrt
__p__fmode
wcscmp
toupper
strncpy
exit
_onexit
_initterm
_ftol
_exit
_except_handler3
_controlfp
_XcptFilter
__argc
__argv
__dllonexit
__getmainargs
__p__commode
__set_app_type
__setusermatherr
_acmdln
_adjust_fdiv
_c_exit
_cexit
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ