Static task
static1
Behavioral task
behavioral1
Sample
f5f36607770be7b071f05d632a1773efd840ba7beff65aa146cf036558848b54.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f5f36607770be7b071f05d632a1773efd840ba7beff65aa146cf036558848b54.exe
Resource
win10v2004-20220901-en
General
-
Target
f5f36607770be7b071f05d632a1773efd840ba7beff65aa146cf036558848b54
-
Size
480KB
-
MD5
6ff26a0299962bcd1a2ab7415939b2dd
-
SHA1
25d9c4c620041e788316f1d5dcabf13615d76b84
-
SHA256
f5f36607770be7b071f05d632a1773efd840ba7beff65aa146cf036558848b54
-
SHA512
0227afecb65e9ab8bd13ecf019745c1dbbdf625cb3c941d8c8c6e9d49f543aa63b8c75dc043571f30babefbe33a96d513d3c1e19e0efb554e6a60153a8892d19
-
SSDEEP
12288:29M5YLIhklMvyPXuhyYCtM32+FHQY9NmJpg85C:29M5y/lMdx12Y9EpguC
Malware Config
Signatures
Files
-
f5f36607770be7b071f05d632a1773efd840ba7beff65aa146cf036558848b54.exe windows x86
ee55894b7b9f82ef3fa29bc5b7eccfb9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetCapture
WinHelpW
SendDlgItemMessageA
RegisterWindowMessageW
GetClassLongW
EnableMenuItem
ModifyMenuW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
SetActiveWindow
GetMessageTime
GetMessagePos
MapWindowPoints
UpdateWindow
GetMenu
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CallWindowProcW
SystemParametersInfoA
IsIconic
GetWindowPlacement
MessageBeep
IsChild
GetTopWindow
GetNextDlgTabItem
GetNextDlgGroupItem
ReleaseCapture
GetDesktopWindow
SetCapture
GetClientRect
GetWindowRect
SetCursor
SetRect
IsRectEmpty
CopyAcceleratorTableW
OffsetRect
PtInRect
CharNextW
GetFocus
SetFocus
MoveWindow
GetDlgCtrlID
IsWindow
IsDialogMessageW
SendDlgItemMessageW
GetDlgItem
CharUpperW
SetWindowsHookExW
CallNextHookEx
GetActiveWindow
GetKeyState
GetCursorPos
GetWindowTextW
GetSysColorBrush
UnhookWindowsHookEx
IntersectRect
CopyRect
GetSysColor
GetWindowDC
GetDC
ClientToScreen
RegisterClipboardFormatW
InvalidateRgn
MessageBoxW
LoadStringW
RedrawWindow
GetSystemMetrics
DrawStateW
PostThreadMessageW
InvalidateRect
SystemParametersInfoW
EndPaint
ReleaseDC
DrawTextW
BeginPaint
SetForegroundWindow
DestroyMenu
EndDialog
CreateDialogIndirectParamW
UnregisterClassA
EqualRect
ShowWindow
SetWindowPos
IsWindowVisible
ValidateRect
DefWindowProcW
GetWindowLongW
DestroyWindow
DispatchMessageW
TranslateMessage
GetMessageW
PostMessageW
PeekMessageW
SetWindowLongW
GrayStringW
DrawTextExW
TabbedTextOutW
PostQuitMessage
GetWindow
SetWindowContextHelpId
MapDialogRect
GetWindowThreadProcessId
SendMessageW
GetParent
GetLastActivePopup
IsWindowEnabled
EnableWindow
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
BringWindowToTop
ExitWindowsEx
LoadBitmapW
SetWindowTextW
LoadCursorW
LoadIconW
RegisterClassExW
CreateWindowExW
RegisterClipboardFormatA
MapVirtualKeyW
DdeClientTransaction
SetMessageExtraInfo
SetClassWord
GetScrollInfo
LoadAcceleratorsW
SetDebugErrorLevel
GetCaretPos
CheckMenuItem
CreatePopupMenu
ole32
OleDoAutoConvert
StgOpenAsyncDocfileOnIFillLockBytes
CoReleaseMarshalData
advapi32
RegCloseKey
RegDeleteValueW
RegEnumKeyExW
RegEnumValueW
RegDeleteKeyW
RegSetValueExW
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
AdjustTokenPrivileges
RegQueryValueExW
OpenProcessToken
RegOpenKeyW
RegEnumKeyW
RegQueryValueW
RegOpenKeyExW
LookupPrivilegeValueW
RegCreateKeyExW
gdi32
SelectObject
DeleteObject
GetStockObject
SetBkMode
GetObjectW
GetDeviceCaps
SaveDC
RestoreDC
SetBkColor
SetMapMode
GetClipBox
GetViewportExtEx
GetWindowExtEx
PtVisible
SetTextColor
kernel32
RaiseException
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapFree
VirtualFree
HeapCreate
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStdHandle
WriteFile
ExitProcess
Sleep
GetModuleHandleA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
LeaveCriticalSection
EnterCriticalSection
InterlockedDecrement
GetLastError
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetProcAddress
GetStartupInfoA
GetCommandLineA
GetSystemDirectoryW
ClearCommBreak
FindFirstVolumeW
GetModuleHandleW
FatalExit
QueryPerformanceFrequency
LocalSize
CreateThread
CloseHandle
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
LoadLibraryA
InitializeCriticalSectionAndSpinCount
HeapAlloc
HeapReAlloc
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
HeapSize
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetCurrentProcess
CreateFileA
SetStdHandle
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 353KB - Virtual size: 353KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ