Static task
static1
Behavioral task
behavioral1
Sample
4c059c437dd3088fd6a9177a785fd659f81a8a37c7eef8d4a595cdc48c993e3e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4c059c437dd3088fd6a9177a785fd659f81a8a37c7eef8d4a595cdc48c993e3e.exe
Resource
win10v2004-20220812-en
General
-
Target
4c059c437dd3088fd6a9177a785fd659f81a8a37c7eef8d4a595cdc48c993e3e
-
Size
784KB
-
MD5
8901e71423210bbfed0735b54dfb00f5
-
SHA1
5e233a183e60f8953e98efb1cca82e194459c8d1
-
SHA256
4c059c437dd3088fd6a9177a785fd659f81a8a37c7eef8d4a595cdc48c993e3e
-
SHA512
81207d74972496c17b96e442f968b6e9beee5706cada108be9df9eaafb37531b98a7be2092b48f3f0a9acb03c71609bf5fe9e3f2f881e92ecc62ce5f15328f60
-
SSDEEP
12288:IPvu0jbV6JT/780LUU6L+xf+99DzuTqu92Nqu+fvW7Uu+oePLU:YvnjbcJT/7xILLMquWuoNquUjiM
Malware Config
Signatures
Files
-
4c059c437dd3088fd6a9177a785fd659f81a8a37c7eef8d4a595cdc48c993e3e.exe windows x86
d99fd07e2453000c9cb7069f95a95da9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DestroyWindow
GetLastActivePopup
VkKeyScanW
GetDesktopWindow
CreateWindowExW
EndDialog
GetKeyboardLayoutList
IntersectRect
SetKeyboardState
FindWindowA
DrawAnimatedRects
SwitchToThisWindow
DefWindowProcA
CreateWindowStationW
NotifyWinEvent
GetSystemMenu
LoadCursorFromFileW
MessageBoxA
MessageBoxW
ShowWindow
DialogBoxIndirectParamW
DdeQueryConvInfo
SwapMouseButton
SetMenuInfo
DdeConnect
LoadBitmapA
LookupIconIdFromDirectoryEx
RegisterClassExA
CreateMDIWindowW
TileWindows
SetScrollPos
SetDlgItemInt
SetWindowLongA
GetMenuItemCount
GetOpenClipboardWindow
RegisterClassA
GetTopWindow
GetScrollRange
AttachThreadInput
ChangeClipboardChain
GetPropW
CreatePopupMenu
LoadMenuA
SendIMEMessageExW
EnableMenuItem
GetMessageTime
ChangeDisplaySettingsW
SetClipboardData
DdeDisconnectList
GetWindowLongW
RegisterDeviceNotificationW
comctl32
InitCommonControlsEx
ImageList_DragLeave
ImageList_GetIconSize
ImageList_Duplicate
ImageList_SetIconSize
kernel32
SetConsoleCtrlHandler
LeaveCriticalSection
GetVersionExA
FindAtomA
SetEnvironmentVariableA
QueryPerformanceCounter
ReadFile
GetConsoleMode
HeapDestroy
GetCurrentThread
GetTimeFormatW
GetStartupInfoA
EnumSystemLocalesA
AddAtomW
TerminateProcess
GetStringTypeA
IsValidCodePage
GetLastError
GetCommandLineA
CompareStringA
RtlUnwind
SetStdHandle
LoadLibraryA
SetUnhandledExceptionFilter
HeapCreate
InterlockedIncrement
VirtualAlloc
GetTickCount
GetDiskFreeSpaceA
HeapReAlloc
GetFileType
LCMapStringW
HeapAlloc
InterlockedDecrement
GetEnvironmentStrings
GetProcessHeap
VirtualFree
GetLocaleInfoW
InterlockedExchange
GetEnvironmentStringsW
SetVolumeLabelW
CreateMutexA
WriteFile
GetTimeFormatA
FreeEnvironmentStringsA
GetACP
CompareStringW
DeleteCriticalSection
GetTimeZoneInformation
WriteConsoleA
GetDateFormatA
UnhandledExceptionFilter
InitializeCriticalSection
TlsFree
ExitProcess
Sleep
EnterCriticalSection
GetCPInfo
FreeLibrary
GetConsoleOutputCP
SetFilePointer
CloseHandle
FreeEnvironmentStringsW
GetCurrentThreadId
GetModuleFileNameA
GetCurrentProcessId
TlsGetValue
CreateFileA
LCMapStringA
OpenMutexA
GetStdHandle
MultiByteToWideChar
IsDebuggerPresent
GetLocaleInfoA
TlsAlloc
WideCharToMultiByte
HeapFree
WriteConsoleW
GetUserDefaultLCID
IsValidLocale
GetModuleHandleA
GetCurrentProcess
LoadLibraryExA
HeapSize
GetSystemTimeAsFileTime
GetOEMCP
FlushFileBuffers
SetHandleCount
TlsSetValue
GetProcAddress
SetLastError
VirtualQuery
GetConsoleCP
GetStringTypeW
wininet
IsUrlCacheEntryExpiredW
SetUrlCacheHeaderData
advapi32
RegEnumKeyExW
StartServiceW
RegReplaceKeyW
LookupPrivilegeNameA
CryptSignHashW
CryptSetProvParam
RegDeleteValueW
shell32
SHAddToRecentDocs
Sections
.text Size: 176KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 404KB - Virtual size: 402KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 136KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ