Static task
static1
Behavioral task
behavioral1
Sample
5915905de763b5b6a42c2ff80f8211ea17f985cb3c1844f3d449d8194144cdb7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5915905de763b5b6a42c2ff80f8211ea17f985cb3c1844f3d449d8194144cdb7.exe
Resource
win10v2004-20220901-en
General
-
Target
5915905de763b5b6a42c2ff80f8211ea17f985cb3c1844f3d449d8194144cdb7
-
Size
184KB
-
MD5
aef3c83035645406cbb46f95c3b1ab8c
-
SHA1
b48e14c4aeb1917bd18bb07009c4d3f1dc6eb2c5
-
SHA256
5915905de763b5b6a42c2ff80f8211ea17f985cb3c1844f3d449d8194144cdb7
-
SHA512
38e2edb0481df0b65998cfe87f5efd0f14965c145274a4f748e1cdaa37d912b43817ab0bfa45397a4257f5bff265b7544a33d5fd6a2194b5bc4620a87d6b612c
-
SSDEEP
3072:PpLb/t64sttki3xY8qmRoRsoE/mUOtoOTcgXMLH+56RLQIJED:1b/E4stesWmIhUOtoOTHX0+56E
Malware Config
Signatures
Files
-
5915905de763b5b6a42c2ff80f8211ea17f985cb3c1844f3d449d8194144cdb7.exe windows x86
781b14cd46687ed9e41ecbdb2c6b587f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
HeapFree
RtlUnwind
TerminateProcess
GetStartupInfoA
GetCommandLineA
RaiseException
HeapSize
HeapReAlloc
GetACP
HeapDestroy
HeapCreate
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
FlushFileBuffers
SetFilePointer
WriteFile
SizeofResource
GetProfileStringA
SetErrorMode
GetOEMCP
GetCPInfo
GetProcessVersion
WritePrivateProfileStringA
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
GlobalFlags
GlobalUnlock
GlobalFree
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetLastError
SetLastError
FreeLibrary
FindResourceA
LoadResource
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcpyA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
MultiByteToWideChar
InterlockedDecrement
InterlockedIncrement
LocalFree
CloseHandle
lstrlenA
WideCharToMultiByte
LoadLibraryA
lstrcpynA
CreateEventA
CreateProcessA
Sleep
WaitForSingleObject
ExitProcess
GetTickCount
MulDiv
FindFirstFileA
FindNextFileA
FindClose
GetFileSize
ReadFile
DefineDosDeviceA
DeviceIoControl
QueryDosDeviceA
GetLogicalDrives
CreateFileA
GetModuleHandleA
GetProcAddress
GetCurrentProcess
GetVersionExA
GetModuleFileNameA
GetSystemDefaultLangID
VirtualFree
user32
CopyRect
GetClientRect
ScreenToClient
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
SetWindowTextA
ShowWindow
LoadStringA
GetClassNameA
PtInRect
ClientToScreen
GetDC
ReleaseDC
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
GetSysColorBrush
InvalidateRect
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
TrackPopupMenu
GetDlgItem
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
OffsetRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
SetWindowsHookExA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
SendMessageA
PostQuitMessage
DestroyMenu
EnableWindow
GetDesktopWindow
DestroyIcon
LoadMenuA
GetCursorPos
MessageBoxIndirectA
GetParent
GetWindowLongA
SetForegroundWindow
FindWindowA
SetMenuItemInfoA
GetSubMenu
CheckMenuItem
HideCaret
ShowCaret
ExcludeUpdateRgn
EnumWindows
UnregisterClassA
PostMessageA
DefWindowProcA
LoadIconA
LoadCursorA
GetMenuItemInfoA
BroadcastSystemMessage
GetMenuItemID
GetTopWindow
DestroyWindow
GetCapture
RemoveMenu
InsertMenuA
CreatePopupMenu
EnableMenuItem
IsWindowUnicode
CharNextA
InflateRect
DefDlgProcA
DrawFocusRect
IntersectRect
gdi32
SaveDC
RestoreDC
SelectObject
GetStockObject
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
GetObjectA
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
DeleteObject
CreateICA
GetDeviceCaps
DeleteDC
CreateDIBitmap
PatBlt
GetTextExtentPointA
BitBlt
CreateCompatibleDC
CreateFontIndirectA
comdlg32
GetOpenFileNameA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegDeleteValueA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
shell32
Shell_NotifyIconA
ShellExecuteExA
SHChangeNotify
comctl32
ord17
Sections
.text Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE